A top official from the U.S. Cybersecurity and Infrastructure Security Agency said Thursday the agency is planning to review updated federal implementation plans and ensure agencies are aligning with zero trust security objectives and addressing any funding gaps or technical challenges.
New voluntary ransomware guidance released during the International Counter Ransomware Initiative meeting this week calls for victims to report attacks to law enforcement on a more timely basis - and involve more advisers in deciding whether to pay a ransom.
The United States Justice Department is coordinating its cybercrime defense mission under a new strategic approach released Wednesday that aims to enhance the collection of electronic evidence, bolster international collaboration and focus on disrupting significant cybercrime actors.
As cyber fraud against senior citizens rises, at least four U.S. states are considering new legislation to fill the gaps in fraud protection normally covered by the federal Consumer Financial Protection Bureau. The bills would protect seniors by empowering banks to block suspicious transactions.
The U.S. Centers for Medicare and Medicaid Services has updated the scope of the MOVEit hacking breach last year, telling a sister agency that the software supply chain attack affected more than 3.1 million individuals - about three times the number of victims disclosed publicly earlier this month.
Four more European Union nations have joined a United States government-led initiative launched in March to tackle spyware misuse globally. The move came amid growing criticism of the European Commission's failure to curb the EU's prolific spyware market.
The U.S. Cybersecurity and Infrastructure Security Agency has released a new plan to further align federal cybersecurity operations that experts say will likely face significant implementation roadblocks due to a lack of funding, leadership buy-in and technical resources.
Technology and security leaders convened at CIO.inc's Cloud and AI Innovation Summit to discuss cloud-driven innovation and AI adoption strategies. The event explored the advantages and risks of cloud and AI adoption and how organizations are using platforms to fuel growth.
China's cyberespionage campaigns, viewed as an extension of the communist regime's wider geopolitical moves, rely on civilian hackers from domestic security firms for much of their success. Researchers say these groups face off in intense rivalries for lucrative government contracts.
The Space Force is suffering from years of delays, setbacks and shortcomings in its Global Positioning System modernization program, according to a Government Accountability Office report, which found major deficiencies and testing issues that could hinder the United States competitiveness in space.
The Australian government has proposed new regulations to place mandatory guardrails on the use of AI in high-risk settings, but private sector industry groups fear that too many laws and regulations around AI could deter businesses from investing in or deploying the AI technology.
Election security experts told Information Security Media Group the United States continues to lack adequate federal funding and resources to support state and local election information technology security efforts amid heightened global tensions and an ever-expanding threat landscape.
Security researchers say China-based cyberespionage group Mustang Panda is stepping up attacks on government agencies in Asia, using new malware tools to breach networks and a reverse shell feature in Visual Studio Code software to gain a persistent foothold in networks.
Healthcare organizations often face obstacles in sharing cybersecurity information. Phil Englert and Errol Weiss from Health-ISAC advocate for shifting the focus from legal risks to business risks, improving incident response and building resilience through collaboration and transparency.
The U.S. federal government is preparing to collect reports from foundational artificial intelligence model developers, including details about their cybersecurity defenses and red-teaming efforts. The Department of Commerce said it wants thoughts on how data should be safety collected and stored.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.