Imposter email attacks: Overcoming ‘needle-in-a-haystack’ threats
Proofpoint fraud expert Rob Holmes looks at how threat actors are exploiting agency supply chains to launch imposter email attacks and compromise agency networks.
Congressional report calls for DOD tech to be built at home
Supply Chains are a critical part of DOD's defense and are vulnerable to disruption and attack, according to a new report.
Industry matters when assessing cyber risk to the defense industrial base
A report by BlueVoyant finds that R&D firms are especially vulnerable to hackers.
NIST to consolidate existing supply chain guidance before issuing new recommendations
The institute is under pressure to publish separate guidance on protecting critical software and testing source code.
GSA tech procurement leader Nakasone to depart June 1
Keith Nakasone is leaving federal government after 32 years to take up a role in the private sector.
CISA has a better understanding of critical software post-SolarWinds hack
The National Risk Management Center spent the last four months determining the risks such software poses to national critical functions and developing tools to mitigate the threat.