Senate Intel chair urges national cyber director to safeguard against open-source software threats
Tom Cotton, R-Okla., cited Chinese and Russian involvement in open-source tech and the risks to government and defense systems.
Tom Cotton, R-Okla., cited Chinese and Russian involvement in open-source tech and the risks to government and defense systems.
The compromise legislation has other cyber provisions besides on commercial spyware, joint NSA-Cyber Command leadership and streamlining regulations.
Despite years of effort to make software safer and more transparent with SBOMs, the rise of AI coding assistants is fueling optimism—and, some experts argue, “kind of insane”—claims about a future with vulnerability-free software.
Contractors chasing certification often risk overspending or over-securing. Virtru’s Trevor Foskett explains why data-focused strategies help meet requirements and keep small businesses in the game.
The company agreed to pay $875,000, with neither side conceding to the other as part of resolving the suit.
The initiative seeks to patch vulnerabilities in open-source code before they are exploited by would-be attackers. Now comes the hard part — putting the systems to the test in the real world.
The agency’s Red-C program seeks to build new defenses into bus-based computer systems.
The post-Colonial Pipeline proposal requires the agency’s charges to follow one cyber mandate to rule them all.
Federal agencies can spare themselves interoperability heartburn tomorrow by testing post-quantum encryption algorithms in live conditions today, official says.