Advocacy groups are questioning whether companies that provide cloud services are doing enough to safeguard voter data and prevent interference in the 2020 election.
As defense agencies continue to move to the cloud and grow their telework environments, they need a more holistic security model to secure sensitive data across clouds and data centers, while protecting users and devices in any location.
In the first known example of ransomware hitting a U.S. election system, Georgia’s Hall County suffered damage to its voter signature database, slowing down verification of absentee ballots.
Remote work has exacerbated an already-tricky problem for IT managers: internet of things security.
The National Institute of Standards and Technology’s Privacy Framework gives organizations a common way to talk about risk.
Cloud-based security tools enable detailed monitoring of user behavior, allowing agencies to understand what’s normal, detect when data is being accessed that shouldn’t and block the highest risks.
A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.
Getting the most from investments in people and technology means simplifying in areas that can be controlled and focusing on control frameworks that reduce risk and complexity.
While a new bipartisan bill clarifies that governors can call on the National Guard to protect critical election infrastructure, some states have already activated guard units.
To help people make informed choices about sharing their data, they need information that accurately sets their expectations about privacy.
Immigration and Customs Enforcement is looking for an automated system that can prescreen applicants for national security positions and assign a complexity score that reflects the likelihood the candidate would be granted a security clearance.
To shore up security of information and communications technology, the nation must reduce its dependency on suppliers from rival powers, especially China, according to the Cyberspace Solarium Commission.
The Continuous Diagnostics and Mitigation program has been able to provide relevant, timely, actionable cybersecurity information to agencies, helping them fortify civilian government data and networks by deploying millions of endpoint sensors and network scanners across agencies.
It only takes one small breach to dent confidence in the nation’s election systems, according to a digital rights and technology expert.