Nextgov

NIST Issues ‘Foundational Profile’ for Secure GPS Use

The NIST released new guidance based on its cybersecurity framework toward satisfying an executive order on securely using position, navigation, and timing services like the GPS.

FTC Approves Settlement with Travel Company that Exposed Database of Customers’ Information

Under the settlement, SkyMed must now resend notices to consumers disclosing the extent of the breach, conduct assessments of its new comprehensive information security program, and more.

US Department of Agriculture Denies Data Breach at Payroll Facility

The U.S. Department of Agriculture has found “no evidence” of a data breach at a payroll processing center but is investigating, a spokesperson said in response to news reports to the contrary.

DOD to Try Out Its Vulnerability Disclosure Program with Contractors

The DoD’s Cyber Crime Center will soon be accepting applications for a limited number of companies within the defense industrial base to benefit from security researchers already working for it.

The Transition to TIC 3.0: Ensuring Agency Readiness for Network Modernization

The recent sophisticated attacks on multiple federal agencies by nation-state hackers demonstrate that new approaches are required to protect federal networks and IT infrastructures.

FTC Warns ‘U.S. Trading Commission’ Website Is a Scam

The FTC issued a unique consumer alert this week, warning that scammers pretending to be the U.S. regulatory agency have been attempting to bilk the public out of their bank accounts and life savings.

Agencies Propose Faster, Broader Reporting of Cyber Incidents for Banks

Cyberspace Solarium Commission has called for a systematic way for critical private-sector entities to share cyber incidents toward gleaning more information about necessary defensive measures.

The Dramatic Year of the Pentagon’s Contractor Cybersecurity Program

Before the idea of CMMC, companies within the defense industrial base simply pledged their adherence to cybersecurity practices outlined by the National Institute of Standards and Technology.

In a Zero Trust World, Compliance Doesn’t Equal Security

Zero trust architecture is the opposite of the old “trust, but verify” methodology—instead, it’s a risk management approach that translates to: “trust nothing and record everything.”

The Hack Roundup: CISA Guidance Warns Affected Systems May Need to Be Rebuilt

The Cybersecurity and Infrastructure Security Agency released a guide for federal, state, and local government leaders on responding to the hack and an online hub for resources.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags