Government - Page 6.4
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A hearing has been filed in the ongoing Georgia election cybersecurity case, Curling v. Kemp, where Georgia citizens are fighting for more secure elections in a lawsuit against Secretary of State and gubernatorial candidate Brian Kemp. The hearing is scheduled for Monday, 17 September, at 11am.
US senators from both sides of the housee have announced a bill that would force the President to act against overseas hackers found targeting the US, or explain why he hadn’t.
The Department of Homeland Security (DHS) has announced the creation of a new cyber-risk management center intended to protect the nation’s banks, energy companies and other industries from potentially crippling cyber-attacks on critical infrastructure, according to agency officials who spoke at the 31 July cybersecurity summit hosted by DHS.
Fancy Bear, a cyber espionage group believed to operate out of the Russian military agency GRU, has reportedly targeted Senator Claire McCaskill and her staff as they prepare for her 2018 reelection campaign.
The Department for Digital, Culture, Media and Sport (DCMS) has launched a consultation into developing the cybersecurity profession in the UK to support the National Cyber Security Strategy (NCSS). To support this effort, it has also proposed to create a UK cybersecurity council, which would sit independently of the government.
A committee of MPs and peers in the UK has criticised the government for its lack of urgency in addressing the cybersecurity skills gap in relation to critical national infrastructure (CNI).
Fallout from a rapid-fire series of developments surrounding the 2016 election hacking and meddling by Russia continued today as President Donald Trump attempted to walk back Monday's public dismissal of his intelligence agencies' findings pointing to Russia.
India’s Prime Minister, Narendra Modi, is preparing for a digital revolution that includes strategies to improve cybersecurity for a digital India; however, as the divide between users and nonusers of the internet narrows, the risk for cyber-attacks increases, according to Prem Behl, Chairman of Exhibitions India Group. As a result, defending India’s critical infrastructure, financial institutions and data security from hackers is critical as the nation advances into the digital age.
California's newly enacted Consumer Privacy Act should have little impact for US organizations that have already implemented measures for complying with the requirements of the European Union's General Data Protection Regulation. But for most others the mandate will likely necessitate a thorough review of their data security controls and in many cases potential updates to them.
HM Revenue and Customs (HMRC) demanded the removal of more than 20,000 malicious sites over the past year, as its efforts to protect taxpayers from scams gained momentum.
Lawmakers in California have introduced a sweeping privacy bill to the state legislature that would give Californians unprecedented control over their data and rein in the power of their Silicon Valley neighbors.
The recent meeting in Singapore between US President Donald Trump and North Korea's Kim Jong Un appears to have attracted an inordinate amount of interest in US activities from threat actors based in Russia.
White-hat hackers participating in a US Department of Defense bug bounty initiative recently rooted out 65 unique security vulnerabilities in the Defense Travel System (DTS), an enterprise application used by millions of DoD workers worldwide.
The UK’s attorney general has clarified the government’s position on state-sponsored cyber-attacks, saying the country will fight back against any nation seeking to cause it harm and continue to attribute serious online threats.
The Department of Homeland Security (DHS) unveiled on Tuesday, 14 May, a new national strategy to be implemented to address evolving cybersecurity risks. The DHS strategy outlines strategic and operational goals and priorities to successfully execute the full range of the DHS secretary’s cybersecurity responsibilities.
Amid a report today that the Trump White House plans to cut the administration's cybersecurity coordinator position altogether, new data shows how US federal government agencies continue to struggle to close security holes in their software.
On May 1st, a website in Tennessee tracking county election results suffered a cyberattack and subsequent incursions before it went down, a security firm concluded.
Dr. Vanessa Teague is one frustrated cryptographer. A researcher at the University of Melbourne in Australia, Teague has twice demonstrated massive security flaws in the online voting systems used in state elections in Australia — including one of the largest deployments of online voting ever, the 2015 New South Wales (NSW) state election, with 280,000 votes cast online.
In March, the Georgia State General Assembly passed a bill that would make it illegal to access a computer or network "without authority." Georgia Governor Nathan Deal has until Tuesday to decide whether to sign it into law or veto it.
Late last year, R. James Woolsey and Brian Fox wrote an op-ed piece about the security benefits of open sourcing election software. Woolsey is a former director of the Central Intelligence Agency. Fox is the creator of several open source components, including the GNU Bash shell, and a board member of the National Association of Voting Officials.
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.