Two new laws that took effect Oct. 1 aim to boost security standards for state and local governments and punish perpetrators of ransomware attacks.
Information sharing is important when dealing with ransomware, but reporting requirements should not to overburden agencies or industry, CISA’s chief says.
By understanding what a zero-trust architecture requires and leveraging existing cybersecurity technologies, processes and open-source solutions, agencies will find getting started isn’t as difficult as it might seem.
The governors of Kansas and Missouri announced the National Security Crossroads, a bipartisan, multi-state initiative to raise the profile of and improve national security missions in the area by highlighting the expanding base of security-related operations.
Cybersecurity and Infrastructure Security Agency Director Jen Easterly told lawmakers that fines may help enable disclosure compliance and enforcement.
Agencies can mitigate the probability of a ransomware attack and improve their chances of recovering from one if they air-gap their backups, supplement detection technology with human expertise and implement layered protection.
Government agencies have the resources they need to improve cybersecurity, but they must work together cohesively to overcome communication and policy barriers to take advantage of those resources.
The federal government is warming to the idea of taking significant action to combat attacks on agencies and their partner organizations.
The IRS wants to be able to decrypt hardware devices used as cryptowallets and set up a repeatable process forensic experts can use to exploit devices seized in investigations.
When agencies know where their IT assets are, who has access and what are users doing with that access, they can build out an identity security program that supports the mission while reducing the complexity of manual provisioning.