Subscribe To Our Daily Enewsletter:

Posts by D. Howard Kass

U.S. Federal Agencies Unite to Mitigate Ransomware Menace

The U.S. Department of Homeland Security (DHS), the Department of Justice (DOJ) and Congressional members unite in war vs. ransomware attacks.

Justice Department Takes Fresh Look at U.S. Cybersecurity Strategy

The U.S. Department of Justice (DOJ) will review cybersecurity strategy, Deputy Attorney General Lisa Monaco said during a virtual conference.

CISA Needs More Money, Lawmakers Tell House Appropriations Committee

The Cybersecurity and Infrastructure Security Agency’s (CISA) needs at least $400 million more in its FY 2022 budget, CISA advocates say.

CISA, NIST Describe Software Supply Chain Attack Preventions, Mitigations

A CISA & NIST report details how MSPs, MSSPs, vendors & software customers can identify, assess & mitigate software supply chain risks.

Homeland Security Alert Describes Russia Cyberattack Tactics

How Russian-backed hacking crews allegedly hijack critical intelligence, according to U.S. Department of Homeland Security (DHS) alert.

Energy Dept Kicks Off 100-Day Initiative to Safeguard U.S. Power Grid

U.S. federal government agencies & private industry partner on United States power grid cybersecurity, the Department of Energy says.

Phishing Attackers Exploited Zoom, eBay & Streaming Services in 2020

Phishers impersonated top digital brands such as eBay, YouTube, Netflix and Twitch, Webroot threat report says.

State Dept Gets Dedicated Cybersecurity Bureau in Newly Proposed Bill

New legislation to give U.S. cybersecurity a more prominent presence within the U.S. Department of State moves forward.

EU Proposal Restricts Artificial Intelligence Use in Certain Settings

European Union considers certain artificial intelligence (AI) restrictions. Critics say proposed AI restrictions fall short.

CISA Orders Federal Government Agencies to Mitigate Pulse Secure Vulnerabilities

Amid high-risk Pulse Secure vulnerabilities, the CISA directs federal agencies to run a tool to check for active exploits.