A tangled mess: Government rules for social media security lack clarity
In wake of SEC breach, federal policymakers, agencies, and experts can’t seem to agree on whether agencies must use MFA on social media.
In wake of SEC breach, federal policymakers, agencies, and experts can’t seem to agree on whether agencies must use MFA on social media.
The agency says the bug is being actively exploited and poses a risk to federal networks.
An anti-Israel hacking group with links to Iran forced a water facility in Pennsylvania to go into manual operations.
A sophisticated campaign that has targeted Israel for at least 8 years shows evidence of improving its capabilities.
Office of Cybersecurity, Energy Security, and Emergency Response hosting a competition scenario “focused on hardening and defending a distributed energy resources management company,” DOE official says.
Attackers are actively exploiting vulnerable Cisco software to primarily target telecommunications companies, researchers say.
Several federal agencies are playing catch-up on meeting recommendations from NIST detailed in a 2018 framework for how government should incorporate privacy into their risk management strategies.
The regulatory road to harmonizing regulations for 16 critical infrastructure sectors is long and treacherous one.
The second open source security summit saw a number of the biggest names in tech gather to discuss how to protect open source software.
Congress shouldn’t let myopic anticipation of the future be the enemy of the opportunities to build critical data policy now.