NIST again narrows post-quantum encryption algorithm candidates
National Institute of Standards and Technology has selected a final group of 15 algorithms that will form the core of the first post-quantum cryptography standard.
States sign on for automated security pilot
Arizona, Louisiana, Massachusetts and Texas are working with the Johns Hopkins Applied Physics Laboratory on a pilot project to test automated threat response.
Sustaining large-scale, long-term remote telework security
If maximum telework becomes the norm for government agencies, it is likely to impact every area of business from network infrastructure to security clearances.
2020 election security top goal for NSA, Cyber Command
Gen. Paul Nakasone, who heads both National Security Agency and U.S. Cyber Command said “safe, secure and legitimate 2020 elections” is his No. 1 objective.
How your local election clerk is fighting global disinformation
State and local election officials are working to take down misinformation and promote voter registration drives, but detecting and reporting misinformation can be difficult for officials to tackle on their own.
IRS improves its fraud, ID theft detection
The tax agency received high marks for its efforts cracking down on tax refund fraud and identity theft, according to a new audit from the Treasury Inspector General for Tax Administration.
Border tech bypassed to push ‘outdated’ solutions for wall, IG says
Rather than assess technology systems and manpower alternatives to securing the border, Customs and Border Protection pushed construction of physical barriers, according to a new report from the Department of Homeland Security’s Office of Inspector General.
How hardsec can deliver next level of cyber defense
Cybersecurity defense strategies based upon dumb machines are actually a very smart plan.
How agencies can step up the fight against phishing
Gaining detailed visibility into which users hackers are targeting and what tools they’re using is the first step on the road to security.
Ransomware criminals are targeting US universities
Cybercriminals can launch massive phishing attacks targeting users of campus networks and gain access to highly desirable and sensitive information related to research, patents and other types of intellectual property data.
Reverse-engineering deception-based attacks
The Defense Advanced Research Projects Agency is looking for ways to automate the identification of tools and processes used in deepfakes, or adversarial machine learning attacks, so an adversary’s unique weaknesses can be targeted and responses developed at scale.
A clear and omnipresent danger: RF exfiltration
Government’s widespread adoption of teleworking and wireless technologies has raised the threat of radio frequency attacks to an all-time high.
Security researcher finds unencrypted video on bodycam from Fort Huachuca
A security researcher who bought a used body camera on eBay was able to extract audio and video of Fort Huachuca military police officers at work.
As lockdowns ease, states must lock up contact tracing data
Contact tracing data can help public health agencies track, identify and quarantine new cases of COVID-19, but if that data falls into the wrong hands, the consequences could be devastating.
Massive vulnerability uncovered in popular networking device
A particularly dangerous vulnerability has been uncovered in F5’s BIG-IP networking devices produced by F5, impacting enterprise networks across the globe.
CISA names top 3 threats to government systems
The Cybersecurity and Infrastructure Security Agency’s EINSTEIN intrusion detection system found that remote-access tool exploitation, fileless Trojan malware and cryptocurrency mining software accounted for 90% of the observed threat activity against civilian federal systems and networks in May.
Automating mobile app security certification
A pilot program has demonstrated a way to speed the expensive and time-consuming security compliance checks required for mobile apps developed or used by federal agencies.
The Rx for DX: Multilayered security for digital transformation
Agencies must adopt rigorous means to secure their data by sharing responsibilities with cloud service providers and deploying zero trust for accessing network resources.
What drives white-hat hackers?
A recent survey of bug bounty participants found that they don’t hunt bugs for the money, but motivated by the work’s flexible hours and chances to improve their skills.
Feds gear up to lock down electric grid supply chain
The Department of Energy is gearing up to lock down the nation’s electric grid by prequalifying vendors of bulk power equipment.
Do Not Sell My Personal Information
When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.
Manage Consent Preferences
Strictly Necessary Cookies - Always Active
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Sale of Personal Data, Targeting & Social Media Cookies
Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link
If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.
Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.
If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.
Cookie List
A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:
Strictly Necessary Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Functional Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Performance Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Sale of Personal Data
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Social Media Cookies
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Targeting Cookies
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.