{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram

Energy using firmware machine learning to bolster electric grid cybersecurity

The Department of Energy is integrating machine learning with a threat information-sharing tool it developed to find cybersecurity adversaries embedded in electric grid control systems. Dave Nyczepir has the story.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

CMMC Accreditation Body hires CFO from insurance group IFG

The Cybersecurity Maturity Model Certification Accreditation Body, the non-governmental body responsible for operating the Department of Defense’s new contractor cybersecurity compliance regulations, has hired Raymond Karrenbauer as CFO. Jackson Barnett has the details.

Coast Guard launches new cyber strategy

The Coast Guard will build more cyber teams to focus on the cybersecurity of maritime critical infrastructure from attacks after a rash of hacks and ransomware incidents that shut down key services, the service’s top cyber officer announced Tuesday. Jackson has this one as well.

FedRAMP just automated checking security authorization packages for completeness

The General Services Administration plans to release XML-automated validations next week allowing vendors to check their security authorization packages for completeness before submitting them to the Federal Risk and Authorization Management Program. Dave Nyczepir has this one also.


How surgical email analysis reduces health care ransomware threats

When health care organizations face ransomware attacks, it’s the patient who ultimately pays the price. Proofpoint’s cybersecurity leader, Ryan Witt says that though organizations have built up an ecosystem of security tools, employees and business associates often pose the greatest risk if they inadvertently fall victim to phishing emails. He explains how data-informed cyber defense strategies help to mitigate the risk of email-based attacks. Read more from Witt.


Strategic approaches to achieve zero trust with security investments

The increased pace and boldness of cyberattacks has government leaders prioritizing zero-trust security investments to mitigate legacy infrastructure risk. According to former White House security advisor Dan Prieto, cloud security solutions are able to deliver key capabilities needed to build a zero trust architecture, including network security, endpoint and application security, malware protection, identity protection and more. Hear more from Prieto.

Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}