In a partially automated process, continuous vetting checks a variety of data sources and flags employees’ concerning behavior or circumstances as part of the security clearance process.
By focusing on privileged access security controls, agencies can substantively boost protection of critical software and harden supply-chain security while also enhancing protection for other assets and identities.
As ransomware attacks on U.S. public and private organizations increase, the federal government may have to have tough conversations with other nations, especially as the lines between nation-state and criminal actors blur.
Asymmetric cryptography, where freely available public keys can be used to verify a private key held by one person, is a highly scalable, robust method for keeping digital IDs secure.
Of the seven new Technology Modernization Fund awards announced Sept 29, four are dedicated to improving cybersecurity, primarily through the transition to zero-trust solutions.
Two new laws that took effect Oct. 1 aim to boost security standards for state and local governments and punish perpetrators of ransomware attacks.
Information sharing is important when dealing with ransomware, but reporting requirements should not to overburden agencies or industry, CISA’s chief says.
By understanding what a zero-trust architecture requires and leveraging existing cybersecurity technologies, processes and open-source solutions, agencies will find getting started isn’t as difficult as it might seem.
The governors of Kansas and Missouri announced the National Security Crossroads, a bipartisan, multi-state initiative to raise the profile of and improve national security missions in the area by highlighting the expanding base of security-related operations.
Cybersecurity and Infrastructure Security Agency Director Jen Easterly told lawmakers that fines may help enable disclosure compliance and enforcement.