Cybersecurity threats demand modernizing federal technology

Read why Christian Marrone says that the growing cyber threats demand that governments mordernize their technology on The Hill : WannaCry. Petya. Wikileaks. Cloudbleed. Hacks of presidential campaigns in France and the United States. Shadow Brokers. Equifax. Deloitte. Those are just some of the most significant cyberattacks of the last 12 months. Read the full article […]

Healey backs bill to guard against data breaches

In the wake of the massive Equifax credit data breach that affected almost half of the state’s residents, Attorney General Maura Healey is backing legislation to help protect consumers. Read about the new bill introduced by state Sen. Barbara L’Italien, D-Andover, and state Rep. Jennifer Benson, D-Lunenburg that would give United States consumers five years […]

US Senators grill SEC chair on disclosure of data breach

U.S. senators from both parties on Tuesday grilled the chairman of the Securities and Exchange Commission — the agency responsible for policing Wall Street — on its handling of a 2016 data breach that was disclosed only last week. Read the news about the US senators from both parties grill Securities and Exchange Commission on […]

Could Europe Teach the U.S. a Lesson About Cyber Regulation?

Read Alyssa Newcomb’s article about whether the United States of America should follow European data protection regulations on NBC News : When it comes to cyber security, there is one universal truth: Everything is hackable. Beyond that, approaches for keeping consumer data safe and standards for reporting breaches wildly vary. Read her full article here.

Threat Intelligence Strategies Suffer from Data Overload

While 86% of organizations believe threat intelligence is valuable to their security mission, many of them struggle with an overwhelming amount of threat data and a lack of staff expertise to make the most of their threat intelligence programs. Read more about the new report by Ponemon Institute, which found that 80% of North American organizations […]

What’s next for agency cyber efforts

When the White House issued its long-awaited executive order on cybersecurity in May, it formalized what many in government had long argued was necessary: adopting the National Institute of Standards and Technology’s Cybersecurity Framework and embracing enterprise risk management at every agency. Read why United States government is asking all its agencies to adopt the National […]

Can the U.S. Senate secure the Internet of Things?

Read Gary Eastwood’s article about whether the United States Senate can secure Internet of Things devices on Network World : As a free and open internet continues to come under assault by the FCC’s proposal to effectively end net neutrality, investors, programmers, and internet users of all stripes have vociferously voiced their support of the […]

Massachusetts Lawmakers Turn Attention to Cybersecurity

In the wake of growing concerns about data privacy and cyber threats, Massachusetts lawmakers are increasingly focused on evaluating and improving the state’s cybersecurity policies and information technology infrastructure. Read about the initiative by Massachusetts lawmakers to amend state cyber security policies on National Law Review.

U.S. Court refuses to dismiss Yahoo lawsuit due to data breach

In this cyber age, a number of companies have access to confidential data of their users. You may have noticed that as soon as you sign up for a website, it assures you that your data will be in safe hands. Read the news about the United States court refusing to dismiss Yahoo data breach […]

Taking Stock of Trump’s Cybersecurity Executive Order So Far

Read Lila Hay Newman take stock of President Trump’s cyber security Executive Order on Wired : By the time President Trump signed his Cybersecurity Executive Order on May 11, it had taken on a mythic air. The administration had produced a series of drafts soon after the inauguration that leaked, circulated, provoked criticism, and motivated […]