Defense bill addresses secure phones, AI training, cyber troop mental health
The compromise legislation has other cyber provisions besides on commercial spyware, joint NSA-Cyber Command leadership and streamlining regulations.
The compromise legislation has other cyber provisions besides on commercial spyware, joint NSA-Cyber Command leadership and streamlining regulations.
Despite years of effort to make software safer and more transparent with SBOMs, the rise of AI coding assistants is fueling optimism—and, some experts argue, “kind of insane”—claims about a future with vulnerability-free software.
Contractors chasing certification often risk overspending or over-securing. Virtru’s Trevor Foskett explains why data-focused strategies help meet requirements and keep small businesses in the game.
The company agreed to pay $875,000, with neither side conceding to the other as part of resolving the suit.
The initiative seeks to patch vulnerabilities in open-source code before they are exploited by would-be attackers. Now comes the hard part — putting the systems to the test in the real world.
The agency’s Red-C program seeks to build new defenses into bus-based computer systems.
The post-Colonial Pipeline proposal requires the agency’s charges to follow one cyber mandate to rule them all.
Federal agencies can spare themselves interoperability heartburn tomorrow by testing post-quantum encryption algorithms in live conditions today, official says.
If elected again, the former president might draw both on returning officials and yet-untapped pockets of talent.