Press reports suggest that US Cybercom is standing down from tracking Russia’s offensive cyber operations, and CISA may no longer consider Russia a priority. Officials say Cybercom’s action is a gambit to get Russia to negotiate, and CISA says th...
Given free rein by President Trump to plumb the depths of US government networks and databases, Elon Musk’s DOGE is putting the federal digital infrastructure at risk on a variety of fronts, security experts say.
A new US Commerce Department rule banning Chinese and Russian hardware and software in internet-connected vehicles takes effect in 2027.
The tactic of luring bad actors into digital traps goes beyond honeypots, requiring robust infrastructure and highly realistic lures to gather intelligence on intruders and identify insider threats.
The ambitious final executive order requires 52 agency actions to bolster cyber protections and counter adversaries, including a new plan to address spiraling digital identity theft.
The 2025 NDAA provides the US military with funding to rip Chinese gear out of telecom networks, protect mobile devices from foreign spyware, create an AI security center, and much more.
Vast and growing data volumes and the shifting nature of threats are complicating the CISO’s job. Experts say a sound foundational risk management approach and essential data protection tools can help.
Bug bounty programs can be a big boon to software security and provide expanded vulnerability visibility, but they're not for all organizations and can come with risks.