Sponsored Resource

  • Cybersecurity
    NSA ft meade sign official nsa photo

    NSA's cyber wing looks to safeguard COVID research and expand outreach

    The spy agency's deputy director said its new cyber directorate is focused on protecting vaccine research from hackers and supporting activities that help get Americans back to work. 05/28/2020

  • Cybersecurity
    Russian cyberattacks

    NSA warns Russian hackers exploited email flaw

    Russian hackers have compromised a longstanding vulnerability in a widely used email delivery software program at least since August of last year, according to an advisory from the National Security Agency. 05/28/2020

  • Congress
    Seal of The National Science Foundation Shutterstock image credit: JHVEPhoto

    Lawmakers look to retool NSF for tech

    Competition with China is at the center of a bipartisan $110 billion plan to boost technology research and development by a dramatic reorganization of the National Science Foundation. 05/27/2020

  • Privacy
    facial recognition

    Privacy report outlines scope, limitations of ICE facial recognition

    According to a recently released privacy assessment, Immigration and Customs Enforcement systems are linked to a network of image databases across the country, and future trainings are being eyed to combat abuse and misuse. 05/27/2020

  • Cybersecurity
    computer hack (MARCUSZ2527/Shutterstock.com)

    Pandemic duties for National Guard include cyber help

    The Maryland National Guard is doing its part to help hospitals and local government detect and deflect malicious online activity during the pandemic. 05/22/2020

  • Congress
    fiber optics and switches (PeterPhoto123/Shutterstock.com)

    Lawmakers want more complete phone encryption on Capitol Hill

    Privacy hawk Sen. Ron Wyden (D-Ore.) is leading the charge to make sure phone traffic between House and Senate offices is encrypted. 05/19/2020

  • Comment
    By Gorodenkoff Shutterstock ID 771480586

    Best practices for agency implementation of CDM

    A seasoned practitioner has some advice on how agencies can optimize their implementations of CDM tools, policies and processes. 05/18/2020

  • Telecommunications
    lock on a chip (shutterstock.com image)

    U.S squeezes Huawei on chip design

    An export rules change will limit the Chinese telecommunications company's ability to use U.S. gear and software to make semiconductors abroad. 05/15/2020

  • Defense

    COVID-19 constraints delay needed CMMC rule change

    Social distancing requirements have delayed the public hearing needed for a rule change to enforce new cybersecurity standards for contractors. 05/11/2020

  • Management
    Ratcliffe and Trump Official White House photo

    ODNI shakes up cyber structure

    A consolidation of the cyber offices at the Office of the Director of National Intelligence is just one piece of a sweeping re-org announced by the spy agency late Friday that includes the elimination of one of four directorates. 05/08/2020

  • Defense
    cloud security (vectorplus/Shutterstock.com)

    DISA wants to scale web-browsing protection pilot

    The Defense Information Systems Agency has expanded use of a web-browsing pilot that protects DOD’s networks via cloud-based internet isolation. Production is expected to begin this summer. 05/05/2020

  • Cybersecurity
    ransomware in cities

    How COVID-19 is changing the game on ransomware

    More money is needed to tackle the problem, especially as states deal with an unprecedented economic crisis caused by the pandemic. It's unclear whether Congress will foot the bill. 05/05/2020

  • Cybersecurity
    By Iren Moroz shutterstock ID 566799760

    Trump wants foreign gear out of the U.S. grid

    An executive order issued by the Trump administration May 1 declared a national emergency and imposes new restrictions on the purchase and use of foreign-made equipment and technology used in the U.S. bulk-power system. 05/02/2020

  • Cybersecurity
    Information sharing

    Amid telework boom, CISA reminds agencies of DNS resolution requirements

    The memo notes that CISA will begin issuing reports to agencies highlighting DNS traffic anomalies and could issue a follow up directive as new protections come online. 05/01/2020

  • Cybersecurity
    security dashboard (KanawatVector/Shutterstock.com)

    Cyber and other transaction agreements

    Other transaction agreements will be subject to the Defense Department’s unified cybersecurity standard, according to Katie Arrington, DOD’s chief information security officer for acquisition. 04/30/2020

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.

Opinion that Matters