cybersecurity
 
  • security (issaro prakalung/Shutterstock.com)

    Defending IT infrastructure with analytics

    The multicloud CyLab environment will develop, test and deploy AI-based analytic tools and software to counter existing and emerging threats.

  • cybersecurity (vs148/Shutterstock.com)

    Lawmakers advance cyber legislation

    The Senate’s 2022 defense authorization bill and a number of House measures are addressing cyber authorities, domestic microelectronics manufacture, supply chain security and raising cyber awareness among the public.

  • $100 bills (RomanR/Shutterstock.com)

    BEP seeks machine-readable counterfeit detection

    The Bureau of Engraving and Printing is looking for new ways to integrate machine-readable features into future versions of U.S. currency that could be used to detect and deter counterfeiting.

  • Pilot project combines federal and state datasets to find SNAP fraud

    How unemployment insurance fraud exploded during the pandemic

    Bots filing bogus applications in bulk, teams of fraudsters in foreign countries making phony claims, online forums peddling how-to advice on identity theft: Inside the infrastructure of perhaps the largest fraud wave in history.

  • Detecting, blocking grid cyberattacks

    To prevent damage to power equipment from cyberattacks, researchers at Idaho National Laboratory have developed a device that autonomously reviews and filters commands being sent to a power grid’s relay devices.

  • phishing emails (JLStock/Shutterstock.com)

    States weigh bans on ransomware payoffs

    While prohibiting ransom payments could help deter attacks, some cybersecurity experts say it’s a bad idea because local governments, particularly smaller ones, may not be able to restore or rebuild their computer networks quickly, resulting in more costs and disruption than paying a ransom.

  • water treatment plant (Kekyalyaynen/Shutterstock.com)

    Rural water utilities vulnerable to cyberattacks

    With few employees and little federal compliance training, some small-town water utilities may be unable to defend themselves from cyberattacks.

  • election security (Shutterstock.com)

    Tabletop exercise tests election security

    At Tabletop the Vote, federal, state and local officials worked through scenarios that might impact future election operations and shared best practices.

  • military communications blockchain

    ‘Blockchain light’ may help Army ensure data trustworthiness

    To make it easier for warfighters and commanders to trust the data they receive, the Army is testing a customized “blockchain-light” technology that helps verify the provenance of data without the compute requirements of traditional blockchain applications.

  • pipeline (Kodda/Shutterstock.com)

    TSA tightens cyber rules for pipelines

    A new directive requires operators of “critical” pipelines to review their current cybersecurity architecture, implement mitigation measures against known threats to IT and operational technology systems and establish plans to recover from a cyberattack.

  • secure cloud (Blackboard/Shutterstock.com)

    Fast track to StateRAMP for more secure state and local government

    StateRAMP stands to significantly elevate and improve cybersecurity by standardizing and transforming cloud solution procurement and reducing costs and complexity for governments and their vendor partners.

  • cybersecurity

    Connecticut pushes cybersecurity with offers of punitive damage protection

    Gov. Ned Lamont signed a bill that will protect businesses from punitive damages resulting from a breach of personal data if they have adopted and adhere to industry-standard cybersecurity measures.

  • ransomware (posteriori/Shutterstock.com)

    Agencies ramp up ransomware defenses

    Federal agencies are stepping up their efforts to help public- and private-sector organizations protect themselves from attack.

  • online disinformation (SkyPics Studio/Shutterstock.com)

    How disinformation monitoring helps agencies break down attacks

    Regardless of how strong an agency’s security systems are, nefarious agents can create fake profiles, manufacture content and visuals and engage with real users who can fall prey to false narratives.

inside gcn