government

SEC demands better disclosure for cybersecurity incidents and threats
As companies increasingly rely on networked systems and on the Internet, cybersecurity threats have grown. Companies that fall victim to a successful cyberattack incur …

Scientists may have identified a new way to improve network security
With cybersecurity one of the nation’s top security concerns and billions of people affected by breaches last year, government and businesses are spending more time and …

Which organizations place a premium on security and privacy?
70 percent of websites qualified for the 2018 Online Trust Audit and Honor Roll, the highest proportion ever, and up from 52 percent in 2017, driven primarily by improvements …

Regulating the IoT: Impact and new considerations for cybersecurity and new government regulations
In 2019 we have reached a new turning point in the adoption of IoT – more markets and industries are migrating to a cloud-based infrastructure, and as the IoT continues to …

Backdoors inevitably create vulnerabilities that can be exploited by malicious actors
73 percent of IT security professionals believe countries with government-mandated encryption backdoors are more susceptible to nation-state attacks. The Venafi survey on …

Unsurprisingly, only 14% of companies are compliant with CCPA
With less than 10 months before the California Consumer Privacy Act (CCPA) goes into effect, only 14% of companies are compliant with CCPA and 44% have not yet started the …

Fewer than 28% of gov.uk using DMARC effectively in line with guidelines
Only 28% of gov.uk domains have been proactive in setting up DMARC appropriately, in line with UK Government Digital Service (GDS) advice in preparation for the retirement of …

Cyber preparedness essential to protect EU from large scale cyber attacks
The possibility of a large-scale cyber-attack having serious repercussions in the physical world and crippling an entire sector or society, is no longer unthinkable. Preparing …

Ongoing global cyber espionage campaign broader than previously known
A detailed analysis of code and data from a command-and-control server responsible for the management of the operations, tools and tradecraft behind the Operation Sharpshooter …

Is 2019 the year national privacy law is established in the US?
Data breaches and privacy violations are now commonplace. Unfortunately, the consequences for US companies involved can be complicated. A company’s obligation to a person …

The impact of cyber-enabled economic warfare escalation
The results of a tabletop exercise on cyber-enabled economic warfare find that when a large-scale destructive cyberattack occurs, the United States and the private sector must …

Email authentication use growing steadily in every industry sector
U.S. federal government agencies and many major enterprises have made significant strides to thwart the spread of fake emails, a major cybersecurity attack vector. But many …
Featured news
Resources
Don't miss
- What makes a security program mature and how to get there faster
- EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations
- Win-DDoS: Attackers can turn public domain controllers into DDoS agents
- How Brandolini’s law informs our everyday infosec reality
- From legacy to SaaS: Why complexity is the enemy of enterprise security