Please turn on your JavaScript for this page to function normally.
USA flag
The cyber posture of the U.S. Federal Government

Government agencies are prime targets for attack due to the sheer amount of sensitive information they possess. As today’s geopolitical landscape continues to become …

handshake
How effective are public-private partnerships?

Ninety-three percent of cyber decision-makers say public-private partnerships are vital to national defense, but only 34 percent believe they are very effective, according to …

vmware
VMware issues critical fixes, CISA orders federal agencies to act immediately (CVE-2022-22972)

VMware has released patches for a privately reported critical vulnerability (CVE-2022-22972) in VMware’s Workspace ONE Access, VMware Identity Manager (vIDM), vRealize …

zero trust
Where do federal agencies stand with zero trust implementation?

One year after the president’s executive order on improving the nation’s cybersecurity, federal agencies are making steady progress toward their zero trust security goals, …

cloud
Smart government agencies are opting for multicloud environments

In recent years, there had been more cyberattacks, ransomware events, and an ongoing discovery of potential vulnerabilities within an IT infrastructure. In addition, the …

Governments under attack must think defensively

In this video for Help Net Security, Tom Van de Wiele, Principal Security Consultant, Cyber Security Services at WithSecure, talks about cyber threats aimed at governmental …

snake, threat
Strengthening the ability of public companies to combat cybersecurity threats

The National Association of Corporate Directors (NACD), SecurityScorecard and the Cyber Threat Alliance released a report that examines the U.S. Securities and Exchange …

Simon Winchester
The changing role of the CCO: Champion of innovation and business continuity

In this interview with Help Net Security, Simon Winchester, VP Worldwide Advanced Technologies at Jumio, talks about the changing role of the chief compliance officer (CCO) …

Department of Defense
Understanding US Defense Department’s relaxed cybersecurity protocols under CMMC 2.0

Department of Defense (DoD) contractors struggling to comply with upcoming cybersecurity regulations under the Cybersecurity Maturity Model Certification (CMMC) can breathe a …

DDoS attacks knock Ukrainian government, bank websites offline

Unknown attackers have mounted disruptive distributed denial-of-service (DDoS) attacks against several Ukrainian government organizations and state-owned banks on Tuesday. The …

zero trust
How ready are federal agencies for zero trust implementation?

More than 70 percent of federal agencies are aggressively adopting zero trust principles, while another 26 percent are adopting where they feel it makes sense, according to a …

biometrics
Governments struggle to deliver secure online citizen services

Auth0 released the findings of its Public Sector Identity Index, a global research report that provides government technology leaders with insight into the identity maturity …

Don't miss

Cybersecurity news