Government

NIST finalizes lightweight cryptography standard for small devices

NIST finalizes lightweight cryptography standard for small devices 2025-08-13 at 17:24 By Anamarija Pogorelec The National Institute of Standards and Technology (NIST) has finalized a lightweight cryptography standard to protect even the smallest networked devices from cyberattacks. Published as Ascon-Based Lightweight Cryptography Standards for Constrained Devices (NIST Special Publication 800-232), the standard offers tools for

React to this headline:

Loading spinner

NIST finalizes lightweight cryptography standard for small devices Read More »

US Announces $100 Million for State, Local and Tribal Cybersecurity

US Announces $100 Million for State, Local and Tribal Cybersecurity 2025-08-04 at 16:04 By Ionut Arghire CISA and FEMA announced two grants of more than $100 million for state, local, and tribal governments looking to improve cybersecurity. The post US Announces $100 Million for State, Local and Tribal Cybersecurity appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

US Announces $100 Million for State, Local and Tribal Cybersecurity Read More »

Sean Cairncross Confirmed by Senate as National Cyber Director

Sean Cairncross Confirmed by Senate as National Cyber Director 2025-08-04 at 15:34 By Ionut Arghire The US Senate voted to confirm Sean Cairncross as the National Cyber Director, five months after nominalization. The post Sean Cairncross Confirmed by Senate as National Cyber Director appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Sean Cairncross Confirmed by Senate as National Cyber Director Read More »

Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities

Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities 2025-08-04 at 13:05 By Eduard Kovacs Illumina will pay $9.8 million to settle accusations that products provided to the US government were affected by cybersecurity flaws. The post Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities Read More »

Bill Aims to Create National Strategy for Quantum Cybersecurity Migration

Bill Aims to Create National Strategy for Quantum Cybersecurity Migration 2025-08-01 at 11:26 By Ionut Arghire Two US senators introduced a bipartisan bill to help prepare federal government agencies for quantum computing threats. The post Bill Aims to Create National Strategy for Quantum Cybersecurity Migration appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Bill Aims to Create National Strategy for Quantum Cybersecurity Migration Read More »

Senate Committee Advances Trump Nominee to Lead CISA

Senate Committee Advances Trump Nominee to Lead CISA 2025-07-30 at 22:36 By Associated Press Committee Members voted to recommend Sean Plankey for director of the Cybersecurity and Infrastructure Security Agency. The post Senate Committee Advances Trump Nominee to Lead CISA appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

Senate Committee Advances Trump Nominee to Lead CISA Read More »

Minnesota Activates National Guard in Response to Cyberattack

Minnesota Activates National Guard in Response to Cyberattack 2025-07-30 at 14:11 By Ionut Arghire Minnesota Governor Tim Walz called in the National Guard to assist the City of Saint Paul in responding to a cyberattack. The post Minnesota Activates National Guard in Response to Cyberattack appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Minnesota Activates National Guard in Response to Cyberattack Read More »

The food supply chain has a cybersecurity problem

The food supply chain has a cybersecurity problem 2025-07-30 at 08:30 By Sinisa Markovic It’s unsettling to think that our food supply chain could be targeted or that the safety of our food could be compromised. But this is exactly the challenge the agri-food sector is dealing with right now. Despite agriculture’s importance, cybersecurity in

React to this headline:

Loading spinner

The food supply chain has a cybersecurity problem Read More »

Six months into DORA, most financial firms are still not ready

Six months into DORA, most financial firms are still not ready 2025-07-25 at 07:57 By Help Net Security It’s been six months since the EU’s Digital Operational Resilience Act (DORA) came into effect, but a new Censuswide survey shows that nearly all financial services organizations in EMEA still feel unprepared. An overwhelming 96% of respondents

React to this headline:

Loading spinner

Six months into DORA, most financial firms are still not ready Read More »

ToolShell Attacks Hit 400+ SharePoint Servers, US Government Victims Named

ToolShell Attacks Hit 400+ SharePoint Servers, US Government Victims Named 2025-07-24 at 12:35 By Eduard Kovacs More information has emerged on the ToolShell SharePoint zero-day attacks, including impact, victims, and threat actors. The post ToolShell Attacks Hit 400+ SharePoint Servers, US Government Victims Named appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

ToolShell Attacks Hit 400+ SharePoint Servers, US Government Victims Named Read More »

From Frameworks to Defence: Using the ISM and Essential Eight Strategically

From Frameworks to Defence: Using the ISM and Essential Eight Strategically 2025-07-23 at 16:20 By Aligning with the Australian Government’s Information Security Manual (ISM) and the Essential Eight (E8) remains a foundational step for organizations working with or alongside government agencies. This article is an excerpt from Trustwave Blog View Original Source React to this

React to this headline:

Loading spinner

From Frameworks to Defence: Using the ISM and Essential Eight Strategically Read More »

UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble?

UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble? 2025-07-23 at 16:20 By Kevin Townsend Critics warn that a ban on ransomware payments may lead to dangerous unintended consequences, including forcing victims into secrecy or incentivizing attackers to shift tactics. The post UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble? appeared first on SecurityWeek.

React to this headline:

Loading spinner

UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble? Read More »

Phishing campaign targets U.S. Department of Education’s G5 portal

Phishing campaign targets U.S. Department of Education’s G5 portal 2025-07-23 at 13:04 By Anamarija Pogorelec A new phishing campaign is targeting users of the U.S. Department of Education’s G5 portal, a site used by educational institutions and vendors to manage grants and federal education funding. Threat researchers at BforeAI uncovered a cluster of lookalike domains

React to this headline:

Loading spinner

Phishing campaign targets U.S. Department of Education’s G5 portal Read More »

Ports are getting smarter and more hackable

Ports are getting smarter and more hackable 2025-07-23 at 08:31 By Sinisa Markovic A new policy brief from NATO’s Cooperative Cyber Defence Centre of Excellence (CCDCOE) warns that critical port infrastructure, responsible for 80 percent of global trade, is increasingly under attack by threat actors tied to Russia, Iran, and China. These ports are essential

React to this headline:

Loading spinner

Ports are getting smarter and more hackable Read More »

UK Sanctions Russian Hackers Tied to Assassination Attempts

UK Sanctions Russian Hackers Tied to Assassination Attempts 2025-07-22 at 13:34 By Ionut Arghire The UK government has sanctioned three Russian APTs and 18 individuals for their involvement in cyber operations against Ukraine, NATO allies, and EU. The post UK Sanctions Russian Hackers Tied to Assassination Attempts appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

UK Sanctions Russian Hackers Tied to Assassination Attempts Read More »

China’s Salt Typhoon Hacked US National Guard

China’s Salt Typhoon Hacked US National Guard 2025-07-16 at 12:25 By Ionut Arghire Chinese hacking group Salt Typhoon targeted a National Guard unit’s network and tapped into communications with other units. The post China’s Salt Typhoon Hacked US National Guard appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

China’s Salt Typhoon Hacked US National Guard Read More »

Where policy meets profit: Navigating the new frontier of defense tech startups

Where policy meets profit: Navigating the new frontier of defense tech startups 2025-07-11 at 08:33 By Mirko Zorz In this Help Net Security interview, Thijs Povel, Managing Partner at Ventures.eu, discusses how the firm evaluates emerging technologies through the lens of defense and resilience. He explains how founders from both defense and adjacent sectors are

React to this headline:

Loading spinner

Where policy meets profit: Navigating the new frontier of defense tech startups Read More »

3 Considerations for Navigating Australian IRAP Assessments

3 Considerations for Navigating Australian IRAP Assessments 2025-07-10 at 17:19 By Learn how a risk-focused mindset, rather than striving for perfect compliance, is key to navigating the Australian Signals Directorate’s (ASD) Information Security Manual (ISM) guidelines. Discover three crucial considerations for organizations, including those overseas, preparing for an IRAP assessment in Australia. Understand why clarifying

React to this headline:

Loading spinner

3 Considerations for Navigating Australian IRAP Assessments Read More »

7 Reasons Why Trustwave’s FedRAMP Status is Key for US Vendors

7 Reasons Why Trustwave’s FedRAMP Status is Key for US Vendors 2025-07-07 at 16:04 By Bill Rucker While selling technology or services to the U.S. Federal Government offers a tremendous opportunity, it also involves navigating complex requirements—especially in the area of cybersecurity. This article is an excerpt from Trustwave Blog View Original Source React to

React to this headline:

Loading spinner

7 Reasons Why Trustwave’s FedRAMP Status is Key for US Vendors Read More »

Scroll to Top