After high profile hacks hit federal agencies, CISA demands drastic SolarWinds mitigation
Impact of the supply chain attacks are not limited to government, with consulting, technology, and telecom sectors all caught in the crosshairs.
Impact of the supply chain attacks are not limited to government, with consulting, technology, and telecom sectors all caught in the crosshairs.
Sacramento began offering free, comprehensive cybersecurity training for workers displaced from jobs due to COVID-19. It’s a model that could have legs for a national program, with the right government commitment.
BakerHostetler assisted in about 1,600 cases tied to cyber breaches this year — about 60 percent more than 2019.
Modern software is typically a patchwork of interdependent code from multiple sources. GitHub will now deliver an advanced warning of potential vulnerabilities detected so programmers can catch issues early on.
Manufacturers affected by the 33 vulnerabilities in open-source TCP/IP stacks often buried deep in the supply chain may not immediately know their devices are at risk.
The final draft of the National Defense Authorization Act contains a provision calling for a Senate-confirmed position to orchestrate cyber strategy and coordinate incident response. The position would, in theory, serve an important role in cooperative efforts between government and industry.
The comments come on the heels of IBM’s discovery that hackers had targeted the cold storage suppliers for COVID-19 vaccine distribution.
Democratic lawmakers have lobbied for more FCC oversight of cybersecurity. In particular, the agency is uniquely placed to regulate the telecommunications sector.
In an exclusive interview, SC Media spoke to the former ally leader and staunch cyber visionary about encryption backdoors, America’s ‘antagonism to government,’ and the benefit of buying local.
The Home Depot breach was, at the time, the largest reported breach in history, capturing 56 million credit cards.