Venable

Amelia Brust/Federal News Network

The VCR, the iPod and now E3A: Technologies that are now antiquated

In an email to agencies earlier this fall, CISA says email filtering and DNS sinkholing capabilities are no longer as valuable as they once were and are…

Read more
Amelia Brust/Federal News Networkcybersecurity, intelligence, network, computers, technology

Industry associations raise alarm bells over legislating software security

Read more
Amelia Brust/Federal News Network

Congress wants to overhaul FISMA. Agencies are already measuring security differently

Read more
VenableDismas Locaria-Venable

What’s different — if anything — about Biden’s ‘Buy American’ agenda from past directives?

Read more
Amelia Brust/Federal News Network

Is CISA’s third cyber emergency directive in five months a sign that things are getting worse?

Read more
(AP Photo/Jenny Kane)FILE - In this Tuesday, Oct. 8, 2019, file photo, a woman types on a keyboard in New York. Following the disclosure of a global cyberespionage campaign that penetrated multiple U.S. government agencies and private organizations, governments and major corporations worldwide are scrambling to see if they, too, were victims. (AP Photo/Jenny Kane, File)

CISA gives agencies 90 days to further harden networks against Microsoft email threat

Read more

Veteran of White House, DHS steps into federal CISO role

Read more

EINSTEIN and TIC never got along, and TIC 3.0 makes their break-up official

Federal cyber experts say the Homeland Security Department’s draft TIC 3.0 implementation guidance is well thought out and gives agencies the necessary…

Read more
Mourners gather during a funeral procession for Abu Mahdi al-Muhandis, deputy commander of Iran-backed militias in Basra, Iraq, Tuesday, Jan. 7, 2020. Thousands of people gathered in Basra on Tuesday to bid farewell to Abu Mahdi al-Muhandis, a senior Iraqi militia commander who was killed in a US airstrike on Friday. (AP Photo)

Cyber threat from Iran sparks warning from CISA, ‘heightened vigilance’ from agencies

Recent tension between the U.S. and Iran have given CISA an opportunity to test its cyber threat intelligence-sharing capabilities in the new year.

Read more

After a dozen years, agencies are freed from restrictive cyber policy

The Office of Management and Budget released the final TIC policy that outlines four uses cases and a series of deadlines to implement a more flexible security architecture.

Read more