A group of hackers with links to the Chinese government compromised the computer networks in six U.S. state governments as part of a campaign that included the exploitation of internet-facing web applications
MoreThe Securities and Exchange Commission has proposed to amend its rules to improve and standardize disclosures by public companies regarding incident reporting, cybersecurity risk management, governance and strategy. The proposal would require
More by Jane Edwards
The FBI has reported that the RagnarLocker ransomware has affected 52 entities across 10 critical infrastructure sectors, including financial services, energy and information technology, as of January. RagnarLocker, which the FBI came
MoreThe Cybersecurity and Infrastructure Security Agency has requested comments on draft federal guidance for using enterprise mobility security technologies in line with the government’s zero trust goals. The draft Applying Zero Trust
MoreThe Department of Homeland Security is looking for companies that can help conduct crowdsourced competitions aimed toward scanning its systems for vulnerabilities in exchange for financial payments. DHS will accept responses for
MoreThe Senate has approved a legislative package that would direct critical infrastructure operators and owners and federal civilian agencies to report major cyberattacks and ransomware payments to the Cybersecurity and Infrastructure Security
More by Jane Edwards
The Federal Risk and Authorization Management Program received in January its role in the implementation of a zero trust approach to cybersecurity across the federal government. Citing an Office of Management and
MoreNational Cybersecurity Center of Excellence has drafted a document that describes the scope, software, hardware and project requirements of a laboratory environment for demonstrating cyber attack response. NCCoE now seeks feedback to
MoreThe Government Accountability Office has offered six recommendations to help the Cybersecurity and Infrastructure Security Agency improve its prioritization activities and related efforts. GAO said Tuesday CISA should enhance its process for
More by Jane Edwards
The National Security Agency has issued a report on best practices for ensuring the security of network infrastructure and protection of individual network devices. The Network Infrastructure Security Guidance report deals with
More by Jane Edwards