The Bureau of Engraving and Printing is looking for new ways to integrate machine-readable features into future versions of U.S. currency that could be used to detect and deter counterfeiting.
Bots filing bogus applications in bulk, teams of fraudsters in foreign countries making phony claims, online forums peddling how-to advice on identity theft: Inside the infrastructure of perhaps the largest fraud wave in history.
To prevent damage to power equipment from cyberattacks, researchers at Idaho National Laboratory have developed a device that autonomously reviews and filters commands being sent to a power grid’s relay devices.
While prohibiting ransom payments could help deter attacks, some cybersecurity experts say it’s a bad idea because local governments, particularly smaller ones, may not be able to restore or rebuild their computer networks quickly, resulting in more costs and disruption than paying a ransom.
With few employees and little federal compliance training, some small-town water utilities may be unable to defend themselves from cyberattacks.
At Tabletop the Vote, federal, state and local officials worked through scenarios that might impact future election operations and shared best practices.
To make it easier for warfighters and commanders to trust the data they receive, the Army is testing a customized “blockchain-light” technology that helps verify the provenance of data without the compute requirements of traditional blockchain applications.
A new directive requires operators of “critical” pipelines to review their current cybersecurity architecture, implement mitigation measures against known threats to IT and operational technology systems and establish plans to recover from a cyberattack.
StateRAMP stands to significantly elevate and improve cybersecurity by standardizing and transforming cloud solution procurement and reducing costs and complexity for governments and their vendor partners.
Gov. Ned Lamont signed a bill that will protect businesses from punitive damages resulting from a breach of personal data if they have adopted and adhere to industry-standard cybersecurity measures.