#federal-cyber-policy

[ follow ]
Intellectual property law
fromNextgov.com
2 days ago

Tech bills of the week: Limiting adversaries' access to US tech; and boosting cyber apprenticeships

New legislation aims to strengthen U.S. export controls on sensitive technologies to prevent adversaries from exploiting them for economic gain.
Cryptocurrency
fromnews.bitcoin.com
5 hours ago

This Week in Crypto Law (Mar. 29, 2026)

Regulators are increasingly asserting control over digital assets while enabling new market structures, as seen in recent developments in the U.S. and Hong Kong.
US politics
fromArs Technica
17 hours ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
fromComputerworld
2 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
#privacy
#cybersecurity
fromTNW | Eu
1 day ago
Information security

European Commission breached after hackers poisoned open-source security tool Trivy

fromTechCrunch
2 days ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

EU data protection
fromSecurityWeek
1 day ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
SF politics
fromNextgov.com
2 days ago

Trump's FY27 budget makes both boosts and cuts to tech operations

The FY27 budget proposal significantly cuts funding for cybersecurity, reflecting ongoing efforts to reduce the Cybersecurity and Infrastructure Security Agency's resources.
Information security
fromTNW | Eu
1 day ago

European Commission breached after hackers poisoned open-source security tool Trivy

A major data breach at the European Commission was caused by TeamPCP exploiting a supply chain attack on the Trivy security tool.
EU data protection
fromTechCrunch
2 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
US news
fromwww.theguardian.com
2 days ago

Senator decries new shoes-on security policy at US airports as reckless'

The new TSA policy allowing shoes on during scans raises security concerns, according to Senator Tammy Duckworth.
Europe politics
fromNextgov.com
4 days ago

State official to EU: Work with us on tech policy or fall behind a generation

The EU's regulatory regime hinders innovation and collaboration with the U.S., threatening economic competitiveness and technological advancement.
DevOps
fromComputerWeekly.com
3 days ago

How 'Wikipedia of cyber' helps SAP make sense of threat data | Computer Weekly

SAP faces significant challenges in securing enterprise data amidst a complex threat landscape and evolving compliance requirements.
fromFuturism
3 days ago

Almost Half of US Data Centers That Were Supposed to Open This Year Slated to Be Canceled or Delayed

"If one piece of your supply chain is delayed, then your whole project can't deliver. It is a pretty wild puzzle at the moment."
Environment
fromThe Local France
3 days ago

France charges four over failed attack on US bank

The man in his early twenties from a Paris suburb had been charged with 'terrorist criminal conspiracy' and remanded in custody. French counter-terrorism prosecutors suspect he asked teenagers to place an explosive device outside the US financial institution near the famed Champs-Elysees avenue.
France news
fromNextgov.com
5 days ago

HHS reverses Biden-era restructuring of its IT and tech operations

HHS Chief Information Officer Clark Minor stated that consolidating the CTO, CDO, and CAIO roles within his office allows the department to move faster on shared platforms and protect systems more effectively.
Healthcare
#cisa
US politics
fromTheregister
2 days ago

Trump wants to slash $707M from CISA's budget

CISA faces a proposed $707 million budget cut, risking national cybersecurity and critical infrastructure management.
fromNextgov.com
1 month ago
Information security

CISA orders agencies to patch and replace end-of-life devices, citing active exploitation

US politics
fromTheregister
2 days ago

Trump wants to slash $707M from CISA's budget

CISA faces a proposed $707 million budget cut, risking national cybersecurity and critical infrastructure management.
fromNextgov.com
1 month ago
Information security

CISA orders agencies to patch and replace end-of-life devices, citing active exploitation

#ai-regulation
fromwww.aljazeera.com
1 week ago
US politics

US lawmakers push for pause in data centres until AI safeguards in place

A moratorium on new AI data centers is proposed to protect workers, civil liberties, and the environment amid concerns over AI's rapid advancement.
US politics
fromwww.aljazeera.com
1 week ago

US lawmakers push for pause in data centres until AI safeguards in place

A moratorium on new AI data centers is proposed to protect workers, civil liberties, and the environment amid concerns over AI's rapid advancement.
SF politics
fromNextgov.com
6 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
US politics
fromwww.npr.org
2 days ago

As DOJ prepares to share state voter data with DHS, a key privacy officer resigns

The DOJ is acquiring sensitive voter registration data, raising privacy concerns, as a key privacy officer resigns amid ongoing legal challenges.
#fbi
Privacy professionals
fromNextgov.com
2 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromSecurityWeek
6 days ago
Privacy professionals

FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers

Threat actors accessed FBI Director Kash Patel's personal email, but no government information was compromised.
Privacy professionals
fromNextgov.com
2 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
#dhs
fromNextgov.com
2 days ago
US politics

President's budget proposes folding beleaguered DHS intelligence office into headquarters

US politics
fromNextgov.com
2 days ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
US politics
fromwww.mediaite.com
3 days ago

Senate Unanimously Passes DHS Funding Bill to End Partial Shutdown, Sending It Back to the House

The Senate approved a bill to partially reopen DHS, moving closer to ending the longest government shutdown.
Information security
fromSecurityWeek
2 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
fromWIRED
2 days ago

CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards

The public Quizlet set contained information about alleged codes for specific facility entrances. 'Checkpoint doors code?' asked one card, with a specific four-digit combination listed in response.
Privacy professionals
#fcc
Information security
fromComputerWeekly.com
5 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Information security
fromComputerWeekly.com
5 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
#data-security
Privacy professionals
fromSecurityWeek
4 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
Privacy professionals
fromSecurityWeek
4 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
#government-shutdown
US politics
fromwww.aljazeera.com
3 days ago

US Homeland Security shutdown to stretch on, despite Senate passing funding

The House has not voted on the Senate bill, prolonging the partial government shutdown affecting DHS funding and federal workers.
US politics
fromwww.aljazeera.com
3 days ago

US Homeland Security shutdown to stretch on, despite Senate passing funding

The House has not voted on the Senate bill, prolonging the partial government shutdown affecting DHS funding and federal workers.
US politics
fromThe New Yorker
2 days ago

What Did the Partial D.H.S. Shutdown Accomplish?

Democrats faced challenges in funding negotiations, leading to multiple government shutdowns and unresolved immigration enforcement issues.
US politics
fromPOLITICO
5 days ago

The DHS shutdown might never end

The government shutdown has left tens of thousands of workers affected, with low morale and no immediate resolution in sight.
Information security
fromInfoWorld
2 days ago

CERT-EU blames Trivy supply chain attack for Europa.eu data breach

TeamPCP exploited Trivy to access sensitive cloud credentials and data, creating significant vulnerabilities for organizations.
#data-breach
EU data protection
fromTheregister
6 days ago

European Commission admits breach of public web systems

The European Commission confirmed a data breach affecting its public web infrastructure, with details on the extent and nature of the data taken remaining unclear.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
EU data protection
fromTheregister
6 days ago

European Commission admits breach of public web systems

The European Commission confirmed a data breach affecting its public web infrastructure, with details on the extent and nature of the data taken remaining unclear.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
EU data protection
fromSecurityWeek
6 days ago

European Commission Reports Cyber Intrusion and Data Theft

The European Commission confirmed a cyberattack that compromised its cloud infrastructure, resulting in the theft of hundreds of gigabytes of data.
US politics
fromenglish.elpais.com
3 days ago

The partial shutdown of the Department of Homeland Security: What's next, and Trump's deadline

Congress is deadlocked over immigration funding, leading to the longest partial shutdown of the Department of Homeland Security in U.S. history.
Privacy professionals
fromAxios
5 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
#ice
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
EU data protection
fromFast Company
1 week ago

The most important defense regulation you've never heard of

CMMC mandates new cybersecurity standards for the defense industrial base, impacting thousands of businesses and transforming the defense supply chain.
Privacy professionals
fromFEDweek
1 week ago

Agencies Need More Complete Guidance on Privacy Considerations of AI Use, Says GAO

GAO identifies gaps in AI guidance, highlighting risks and the need for comprehensive privacy protections in agency implementations.
Information security
fromSecurityWeek
3 days ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
US politics
fromMail Online
4 days ago

Deadline issued for UFO videos as Congress warns of 'threat' to US

Lawmakers demand federal agencies release UFO videos by April 14, 2026, citing potential threats to US military forces.
Information security
fromSecuritymagazine
5 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Privacy professionals
fromNextgov.com
1 week ago

Tech bills of the week: Child social media safety, Data center moratorium, and more

New child safety legislation, Sammy's Law, aims to enhance parental control over children's social media use through safety notifications and monitoring tools.
#ai-security
Privacy professionals
fromNextgov.com
2 weeks ago

National cyber director doesn't envision industry doing offensive hacking

The U.S. National Cyber Director clarifies that private sector companies will not conduct offensive cyber operations on behalf of the government, but will instead provide intelligence and defensive support.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Privacy professionals
fromSecurityWeek
4 weeks ago

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
fromWIRED
2 weeks ago

US Takes Down Botnets Used in Record-Breaking Cyberattacks

The US Department of Justice, working with the cybercrime-fighting agency within the US Department of Defense known as the Defense Criminal Investigative Service, announced that it had dismantled four massive botnets in a single operation, removing the command-and-control servers used to commandeer the hacker-run armies of compromised devices known by the names JackSkid, Mossad, Aisuru, and Kimwolf.
Information security
Information security
fromThe Cipher Brief
2 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
Information security
fromSecuritymagazine
3 weeks ago

Security Leaders Discuss Trump's Cyber Strategy for America

The Trump Administration released a cyber strategy with six pillars addressing adversary capacity, regulation, federal and critical infrastructure security, emerging technology innovation, and workforce development.
Information security
fromSecurityWeek
4 weeks ago

US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

Trump administration releases comprehensive cyber strategy emphasizing government-private sector coordination, deterrence, regulatory reform, and investment in AI and quantum technologies to strengthen national cybersecurity.
Information security
fromNextgov.com
1 month ago

FBI is probing 'suspicious' breach into bureau networks

The FBI is investigating suspicious activities on its networks, potentially involving systems used for court-ordered wiretapping requests.
fromNextgov.com
1 month ago

Why the convergence of AI and cybersecurity must be a top priority for the administration

AI is directly impacting blue team (defender) and red team (attacker) strategies, operations and tactics. Federal cybersecurity teams are increasingly relying on AI for anomaly detection, predictive threat intelligence and faster incident response. AI can flag suspicious behavior, such as access to sensitive systems from unusual locations, without depending on static rules.
Information security
fromNextgov.com
1 month ago

US cyber responses will be 'linked to adversary actions' and involve industry coordination, official says

Future U.S. government responses in cyberspace will be "linked to adversary actions" and will involve coordination between the private sector and smaller governments, a top White House official said Thursday. The dynamic, which will be codified in a forthcoming national cyber strategy, is meant to make clear that foreign adversaries' actions that target U.S. networks have consequences, according to Alexandra Seymour, who serves as the principal deputy assistant national cyber director for policy in the Office of the National Cyber Director.
US politics
US politics
fromNextgov.com
2 months ago

Tech Bills of the Week: Measures seek to boost cyber posture of utilities

Congressional bills empower the Energy Department to strengthen physical and cyber security of pipelines, LNG facilities, and smaller electric utilities with grants and coordination.
#cisa-2015
fromDeveloper Tech News
2 months ago

White House rescinds software security compliance mandates

The Office of Management and Budget (OMB) issued Memorandum M-26-05 (PDF) which officially revokes the 2022 policy known as M-22-18 and its 2023 companion policy, M-23-16. This reversal alters the governance landscape for enterprise architects and platform engineers who service federal contracts or align with federal standards. The previous directives mandated specific secure software development practices, including the widespread generation and maintenance of Software Bills of Materials (SBOMs).
US politics
fromTechzine Global
2 months ago

America puts an end to international cyber cooperation

On the instructions of President Donald Trump, the United States is withdrawing from international organizations that focus on cybersecurity and hybrid threats. There are concerns within the cybersecurity sector that this decision could undermine global resilience to digital threats. As reported by Computing, the US government claims that these partnerships are not sufficiently effective and are not in line with national interests.
US politics
US politics
fromTheregister
2 months ago

CISA insider-threat warning comes with an ironic twist

Insider threats are among the most serious security risks and require multidisciplinary teams and decisive action to detect, mitigate, and prevent damage.
Information security
fromThe Hacker News
1 month ago

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

CISA added four actively exploited high-severity vulnerabilities to its KEV catalog, including Chrome use-after-free, TeamT5 arbitrary upload, Zimbra SSRF, and Windows ActiveX RCE.
Information security
fromNextgov.com
2 months ago

Building government resilience in an era of AI-driven cyberattacks

Governments must rapidly transform defenses to counter escalating, stealthy AI-driven cyberattacks and prepare for destructive operations targeting critical infrastructure.
[ Load more ]