Monday, April 6, 2020

Subscribers Only

Free

Coronavirus Will Not Delay Pentagon’s Contractor Cybersecurity Program, Official Says

The Defense Department has officially entered into an agreement with the nonprofit corporation that will serve as the accreditation body for its Cybersecurity Maturity...

Amid Coronavirus, CISA and NIST Issue Guidelines to Boost Federal Telecommuting

The forced rush to telecommuting has caused many problems, with one of the most concerning being a surge in targeted attacks against strained federal...

The Case for a Federal Digital Privacy Strike Force

Under the terms of the Telephone Robocall Abuse Criminal Enforcement and Deterrence (TRACED) Act, the Department of Justice, FTC, and FCC have each been undertaking notable activity against robocallers and those who provide services to them. However Stuart N. Brotman of the Woodrow Wilson International Center for Scholars points out at they aren’t acting in […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

Australian Cyber Security Centre Issues Warning Around Coronavirus-Themed Malicious Cyber Activity

The Australian Cyber Security Centre has issued a new threat update, seeking to raise awareness around coronavirus-themed malicious cyber activity. It says that COVID-19...

Critical Infrastructure Cyberattacks a Greater Concern than Enterprise Data Breaches

A new report from Claroty details a number of potential contributing factors for today’s CISOs to consider, including the convergence of IT and OT roles. The Global State of Industrial Cybersecurity reports that 74 percent of IT security professionals globally are substantially more concerned about a cyberattack on critical infrastructure than an enterprise data breach. […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

“Just Say No” Is Not a Strategy for Supply Chain Security

David Forscey and Herb Lin comment on the Trump Administration’s argument that allied governments—and the businesses they oversee—should purge certain telecommunications networks of Huawei equipment, reflecting the United States’ preferred approach of banning select companies that meet an as-yet-unknown threshold of risk to national security. They argue instead for a more sophisticated approach, one designed […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

Nebraska’s Centralized Approach to Cybersecurity, Compliance in Age of Coronavirus

Although Nebraska is not yet seeing large numbers of COVID-19 cases, and is not operating under a stay-at-home order, state CIO Ed Toner believes...

Singapore Most Exposed, But Also Most Prepared in Cybersecurity: Deloitte

Singapore faces the highest cybersecurity risk in Asia-Pacific due to its high internet adoption rate, but it is also the most prepared to deal with it in terms of policies and organizational readiness, according to Deloitte’s Cyber Smart Index. On the other end of the spectrum, Indonesia faces the least risk exposure, and is also […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.

NIST Cybersecurity Recommendations for Working from Home

The Information Technology Laboratory, a component of the NIST Computer Resource Center, has issued a bulletin that reiterates NIST standards for teleworking. Security for...

How the Federal Tech Community Is Coping With COVID-19

With so many “non-essential” workplaces closed, the federal IT workforce is now primarily responsible for keeping the federal government operating. The Office of Management and Budget has provided top-level guidance, but agencies still need to determine what work can be done remotely and which critical missions still require employees to physically show up. Instead of […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.