“Academics will sit back and say, ‘Well, if you just did that and that and that, you would have avoided it.’ But if there’s no way to impose risk or consequences for [threat actors] doing it, your day is coming,” Mandia said.
By Brad D. WilliamsNotably, the committee chair’s markup calls for private sector engagement in developing new cyber threat sharing capabilities.
By Brad D. Williams“We shouldn’t be relying on voluntary reporting to protect our critical infrastructure,” Sen. Warner said.
By Brad D. Williams“[Paying the ransom] was the hardest decision I’ve made in my 39 years in the energy industry… and I put the interest of the country first,” Colonial’s CEO told Congress. “I believe with all my heart [paying the ransom] was the right choice to make, but I want to respect those who see this issue differently.”
By Brad D. WilliamsThis year, the Defense Information Systems Agency has ambitious plans to streamline and speed up how military personnel access applications and services on the Defense Department’s computer networks. These efforts include launching a new pan-service user environment, making enterprise services easier to use and access, increasing the offerings and capabilities of cloud based systems, and…
By Henry Kenyon