As federal agencies accelerate their zero trust strategies, identity, credential, and access management (ICAM) has become mission-critical. The Defense Department is taking a federated approach, enabling single identities to securely span multiple systems. But with every badge, credential, and privilege comes both opportunity and risk — and the stakes couldn’t be higher.
The Next Era: Cybersecurity, workforce and the future of digital services
Nov 19, 2025 2:00 p.m. ET Webinar
As agencies accelerate their digital transformation efforts, the need to deliver seamless, secure and user-friendly services has never been more urgent. From implementing zero trust to enhancing the customer experience, federal leaders are navigating complex decisions around modernization, workforce priorities and cybersecurity readiness.
In this timely conversation, government and industry leaders will share lessons learned, strategic priorities and what’s next on the road to modern, secure public services.
Over 15 Malicious npm Packages Exploiting Windows to Deploy Vidar Malware
Datadog Security Research has uncovered a sophisticated supply chain attack targeting the npm ecosystem, involving 17 malicious packages across 23 releases designed to deliver the Vidar infostealer malware to Windows systems.
The campaign, attributed to a threat actor cluster tracked as MUT-4831, represents a significant escalation in npm-based threats and marks the first known public disclosure of Vidar malware being distributed through npm packages.
Accelerate together — Secure by AI
Top cybersecurity experts share insights on how to outpace adversaries by using AI to your advantage.
Featuring perspectives from AWS, CrowdStrike, Palo Alto Networks, and Splunk, this e-book explores how agencies can harness AI’s potential while staying one step ahead of its risks.
Federal News Network’s Industry Exchange Cloud 2025
Dec 8, 2025 1:00 p.m. ET
Webinar
Join us as top technology leaders dive into the latest cloud breakthroughs and share actionable strategies to help agencies modernize, optimize and innovate.
We’ll explore questions that matter now:
- What’s changing in cloud data management and analytics — and why does it matter?
- How can your agency harness AI in the cloud to drive mission outcomes?
- What does it take to scale operations in the cloud securely?
- What defines a smart cloud migration in 2025?
- How can you tap into cloud for effective IT spend management?
Secure Boot bypass risk threatens nearly 200,000 Linux Framework laptops
Around 200,000 Linux computer systems from American computer maker Framework were shipped with signed UEFI shell components that could be exploited to bypass Secure Boot protections.
An attacker could take advantage to load bootkits (e.g. BlackLotus, HybridPetya, and Bootkitty) that can evade OS-level security controls and persist across OS re-installs.
Microsoft Outlook Bug on Windows Devices Results in Repeated Email Crashes
Microsoft is currently investigating a significant bug affecting classic Outlook for Windows that prevents users from accessing their email accounts.
The issue manifests as a persistent error message stating “Cannot start Microsoft Outlook. Cannot open the Outlook window. The set of folders cannot be opened. The attempt to log on to Microsoft Exchange has failed.” According to Microsoft’s official documentation updated on September 26, 2025, this particular error can occur for various reasons, but recent support cases have primarily involved user mailboxes experiencing authentication failures.
How to achieve secure, mobile-first collaboration in the zero trust era
What does secure collaboration really look like in action?
There’s always tension between using the newest technology and ensuring it’s secure. In our latest e-book, we explore how federal leaders are navigating this challenge across branches and agencies.
Securing Tomorrow’s Infrastructure: AI, Strategy, and Collaboration
Federal agencies are navigating an increasingly complex IT environment—balancing modernization, security, and mission delivery. Learn more in this webinar on Wednesday, October 8th at 2 p.m.
Key Discussion Topics
- The current IT landscape: infrastructure threats and challenges
- The future of IT infrastructure: AI applications, data center capacity, cybersecurity, and network collaboration
- Practical strategies and best practices to modernize infrastructure securely
- Impacts on agency funding, staff readiness, and mission outcomes
Maryland Transportation Systems Disrupted Following Cyberattack
Maryland’s transit network experienced widespread disruption this week after a sophisticated cyberattack targeted critical information systems, forcing the Maryland Transit Administration (MTA) and the Department of Information Technology (DoIT) to scramble containment efforts.
While most core services remain operational, significant impacts to scheduling and real-time information have left thousands of commuters seeking alternative arrangements. DoIT security monitors detected unauthorized access to portions of MTA’s back-end systems.
