During this one-day event, technology and systems engineering leaders from AWS and its partners will detail the ways their tools help agencies solve those challenges in tandem.
Apr 10, 2025 1:00 p.m. ET
Webinar
Supply Chain Risk Management Capabilities Center
During this one-day event, technology and systems engineering leaders from AWS and its partners will detail the ways their tools help agencies solve those challenges in tandem.
Apr 10, 2025 1:00 p.m. ET
Webinar
This publication provides guidance on how to use Zero Trust in privacy implementation. It highlights the core principles of privacy and how they can align with a Zero Trust architecture, touching on privacy impact assessments (PIAs) as well.
As the world increasingly digitizes, these recommendations become all the more critical. They aren’t just about protecting privacy. Zero Trust ensures that organizations identify, locate, process, and dispose of such data with the right level of security.
AhnLab SEcurity intelligence Center (ASEC) recently identified the distribution of GuLoader malware via a phishing email by impersonating a famous international shipping company. The phishing email was obtained through the email honeypot operated by ASEC. The mail body instructs users to check their post-paid customs tax and demands them to open the attachment.
Despite ongoing efforts by the Defense Department to bolster the space supply chain, government and commercial satellite programs continue to struggle with shortfalls in several critical areas, including on-orbit propulsion, optical communications terminals and hardened electronics, according to industry and Pentagon officials.
A U.S. congressional committee on Wednesday urged Americans to remove Chinese-made wireless routers from their homes, including those made by TP-Link, calling them a security threat that opened the door for China to hack U.S. critical infrastructure. The House of Representatives Select Committee on China has pushed the Commerce Department to investigate China’s TP-Link Technology Co, which according to research firm IDC is the top seller of WiFi routers internationally by unit volume.
According to the researchers, a complete fix could take several years, as Apple would need to update all Find My-compatible devices, including iPhones and other connected hardware. However, even after the necessary firmware updates are released, adoption may be slow, as not all users immediately upgrade their devices.
Feb 27, 2025 2:00 p.m. ET – Webinar
Join us for a discussion on the evolving role of OSINT in national security. As hybrid threats grow more complex, Open-Source Intelligence (OSINT) is becoming a critical tool for government agencies and private sector partners. Our speakers will explore OSINT’s integration with other intelligence disciplines, the importance of public-private collaboration and the steps needed to professionalize the field.
Key Topics:
Cybercriminals have recognized that instead of attacking an organization head-on, they can infiltrate through the software supply chain—like slipping counterfeit parts into an assembly line. According to the 2024 Sonatype State of the Software Supply Chain report, attackers are infiltrating open-source ecosystems at an alarming rate, with over 512,847 malicious packages detected last year alone—a 156% increase from the previous year. Traditional security tools and processes often miss these threats, leaving organizations unprepared.
Government cybersecurity strategies are constantly evolving to address new threats. The Departments of Defense and Homeland Security prioritize proactive defense, including integrating security into the development process and adopting zero trust principles. They also focus on threat intelligence, workforce development and modernizing infrastructure to build a more resilient and secure nation.
A security researcher discovered a flaw in Cloudflare’s content delivery network (CDN), which could expose a person’s general location by simply sending them an image on platforms like Signal and Discord.
While the geo-locating capability of the attack is not precise enough for street-level tracking, it can provide enough data to infer what geographic region a person lives in and monitor their movements.