#cabinet-protection

[ follow ]
#cybersecurity
Information security
fromThe Hacker News
6 days ago

The AI Arms Race - Why Unified Exposure Management Is Becoming a Boardroom Priority

The cybersecurity landscape is rapidly evolving, with AI enabling faster and more sophisticated attacks, necessitating advanced defensive strategies.
Information security
fromSecuritymagazine
2 weeks ago

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Cybersecurity practitioners face data overload, struggling to extract meaningful insights while focusing on relevant threats to reduce business risk.
Healthcare
fromSecuritymagazine
12 hours ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
Information security
fromThe Hacker News
6 days ago

The AI Arms Race - Why Unified Exposure Management Is Becoming a Boardroom Priority

The cybersecurity landscape is rapidly evolving, with AI enabling faster and more sophisticated attacks, necessitating advanced defensive strategies.
Information security
fromSecuritymagazine
2 weeks ago

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Cybersecurity practitioners face data overload, struggling to extract meaningful insights while focusing on relevant threats to reduce business risk.
#cisa
SF politics
fromSecurityWeek
3 hours ago

White House Seeks to Slash CISA Funding by $707 Million

The Trump administration proposes a $707 million budget cut for CISA to refocus on core missions and eliminate inefficiencies.
SF politics
fromSecurityWeek
3 hours ago

White House Seeks to Slash CISA Funding by $707 Million

The Trump administration proposes a $707 million budget cut for CISA to refocus on core missions and eliminate inefficiencies.
#national-security
Science
fromThe Cipher Brief
2 hours ago

A Wartime Budget Without an Innovation Strategy

Collaboration between the NSF and defense sectors is essential for national security and innovation, despite proposed budget cuts to NSF funding.
World politics
fromThe Cipher Brief
2 weeks ago

National Security Starts at Home - Not on the Battlefield

National security relies on enduring internal capacity rather than just accumulated hard power or visible instruments of power.
Science
fromThe Cipher Brief
2 hours ago

A Wartime Budget Without an Innovation Strategy

Collaboration between the NSF and defense sectors is essential for national security and innovation, despite proposed budget cuts to NSF funding.
World politics
fromThe Cipher Brief
2 weeks ago

National Security Starts at Home - Not on the Battlefield

National security relies on enduring internal capacity rather than just accumulated hard power or visible instruments of power.
Philosophy
fromFast Company
17 hours ago

Twenty seconds to approve a military strike; 1.2 seconds to deny a health insurance claim. The human is in the AI loop. Humanity is not

Artificial intelligence significantly accelerates decision-making in military and business contexts, but human oversight may be minimal and ineffective.
Non-profit organizations
fromNextgov.com
18 hours ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
#physical-security
Psychology
fromSilicon Canals
3 days ago

The people who always have a backup plan aren't pessimists. They grew up in environments where promises were unreliable, and redundancy became the only architecture that didn't collapse when someone changed their mind without warning. - Silicon Canals

Obsessive planners are often generous, driven by past experiences that teach them to prepare for uncertainties.
#government-shutdown
fromThe New Yorker
3 days ago
US politics

What Did the Partial D.H.S. Shutdown Accomplish?

Democrats faced challenges in funding negotiations, leading to multiple government shutdowns and unresolved immigration enforcement issues.
US politics
fromwww.aljazeera.com
4 days ago

US Homeland Security shutdown to stretch on, despite Senate passing funding

The House has not voted on the Senate bill, prolonging the partial government shutdown affecting DHS funding and federal workers.
US politics
fromThe New Yorker
3 days ago

What Did the Partial D.H.S. Shutdown Accomplish?

Democrats faced challenges in funding negotiations, leading to multiple government shutdowns and unresolved immigration enforcement issues.
US politics
fromwww.aljazeera.com
4 days ago

US Homeland Security shutdown to stretch on, despite Senate passing funding

The House has not voted on the Senate bill, prolonging the partial government shutdown affecting DHS funding and federal workers.
UK politics
fromwww.bbc.com
4 days ago

Police offered support to tackle rising threats against MPs

A new national democracy protection unit is established to support police in addressing rising threats and abuse against MPs.
Remote teams
fromInfoQ
5 days ago

How to Handle Trusts and Psychological Safety When Scaling Organizations

Trust must be built team by team; it cannot be replicated as organizations scale.
fromSilicon Canals
7 hours ago

When militaries share data centers with banks: how Gulf strikes exposed a structural flaw in global cloud infrastructure - Silicon Canals

When civilian banks, logistics platforms, and payment processors share physical data center infrastructure with military AI systems, those facilities become legitimate military targets under international humanitarian law - and the civilian services housed inside lose their legal protection.
Information security
fromFortune
3 days ago

The Trump administration is blurring the public and private sector workforce, and OPM director Scott Kupor won't rule out conflict of interest risks | Fortune

One of the things that I'm hoping to do a better job on is getting people from the private sector-who've been in the private sector their whole career-who also spend a couple years in government at some point in their career, and learn something.
Non-profit organizations
US politics
fromwww.npr.org
4 days ago

As DOJ prepares to share state voter data with DHS, a key privacy officer resigns

The DOJ is acquiring sensitive voter registration data, raising privacy concerns, as a key privacy officer resigns amid ongoing legal challenges.
Washington DC
fromAxios
4 days ago

Trump to circumvent Congress with order to pay all DHS workers

Trump plans to pay all DHS employees directly, bypassing Congress amid ongoing government shutdown negotiations.
Podcast
fromSecuritymagazine
1 week ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
fromSecuritymagazine
4 days ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
Information security
fromNextgov.com
6 days ago

HHS reverses Biden-era restructuring of its IT and tech operations

HHS Chief Information Officer Clark Minor stated that consolidating the CTO, CDO, and CAIO roles within his office allows the department to move faster on shared platforms and protect systems more effectively.
Healthcare
fromMail Online
1 week ago

Emergency playbook for worldwide crises quietly released

The guidance comes from the International Energy Agency (IEA), which last week released its report 'Sheltering From Oil Shocks' outlining 10 steps countries could take if supplies tighten.
Environment
#dhs
fromNextgov.com
3 days ago
US politics

President's budget proposes folding beleaguered DHS intelligence office into headquarters

US politics
fromNextgov.com
3 days ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
US politics
fromIntelligencer
4 days ago

Johnson Caves on DHS, But Shutdown Deal Could Unravel Again

The Senate passed a bill to reopen DHS, but House Republicans rejected it until a sudden agreement was reached with Trump's assurance of funding.
US politics
fromwww.mediaite.com
4 days ago

Senate Unanimously Passes DHS Funding Bill to End Partial Shutdown, Sending It Back to the House

The Senate approved a bill to partially reopen DHS, moving closer to ending the longest government shutdown.
US politics
fromwww.theguardian.com
5 days ago

Republican leaders agree to advance funding deal to end DHS shutdown

Congress is advancing legislation to fund DHS operations, excluding immigration enforcement, potentially ending the longest funding lapse in US history.
Psychology
fromFortune
1 week ago

What avalanche safety training can teach corporate boards about bad decisions | Fortune

Unanimous decisions in corporate boards may indicate group dynamics issues rather than true agreement, similar to avalanche safety training.
US politics
fromenglish.elpais.com
4 days ago

The partial shutdown of the Department of Homeland Security: What's next, and Trump's deadline

Congress is deadlocked over immigration funding, leading to the longest partial shutdown of the Department of Homeland Security in U.S. history.
SF politics
fromenglish.elpais.com
2 weeks ago

The future of FEMA is at stake under the leadership of Markwayne Mullin

The removal of Kristi Noem from DHS raises concerns about FEMA's future leadership and disaster response effectiveness under Markwayne Mullin.
fromComputerworld
3 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
#executive-protection
Information security
fromSecuritymagazine
6 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromSecuritymagazine
6 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Philosophy
fromApaonline
3 weeks ago

Secrecy, Democracy, Necessity

Executive officials justify secrecy through claims of protecting decision-making integrity and national security, but such necessity arguments alone cannot legitimize secret governance in democracies.
Information security
fromSecurityWeek
4 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Information security
fromTheregister
5 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
US politics
fromwww.npr.org
5 days ago

Republicans in Congress say they have a deal to end the record-long shutdown at DHS

Republican leadership has revived a plan to fund the Department of Homeland Security after a 47-day funding lapse, excluding ICE and Border Patrol initially.
fromLondon Business News | Londonlovesbusiness.com
1 month ago

Protecting and defending your business from attack, UAE Style - London Business News | Londonlovesbusiness.com

But what wonderful hospitality am I and thousands of others receiving as the UAE is battered daily by dozens of killer Iranian missiles and suicide drones, aimed indiscriminately at civilian, economic and military targets. Not only is life here still comfortable and as close to normal as it possibly can be with warheads gate-crashing breakfast at Mach 5 (3,300 mph), but our generous hosts are picking up the tab.
World news
Information security
fromSecurityWeek
6 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
US politics
fromAxios
5 days ago

Republicans announce plan to end record-long DHS shutdown

Republican Congress plans to fully fund immigration enforcement and border security while reopening the Department and ensuring federal workers are paid.
fromFast Company
1 month ago

Why strong leaders lose credibility in high-stakes moments

What most leaders label as a content problem is actually a presence problem. Leaders often assume credibility rises and falls based on wording alone. In reality, credibility is shaped by executive presence, which reflects the signals leaders send about confidence, clarity, and authority before their ideas are fully heard.
Psychology
US politics
fromAxios
5 days ago

Exclusive: Trump's DOJ says he's not required to turn over official records

The Presidential Records Act mandates that presidential records belong to the U.S. government, a law Trump has challenged by retaining documents.
US politics
fromThe Atlantic
5 days ago

The Anger Trailing Congress Around the Country

Congress failed to fund the Department of Homeland Security, risking federal employee paychecks amid rising public anger and potential electoral consequences for Republicans.
Information security
fromComputerWeekly.com
6 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
US politics
fromwww.mediaite.com
6 days ago

Speaker Mike Johnson Blames Senate for Ongoing DHS Shutdown: They Need to Do Their Job and Help Us'

Speaker Mike Johnson blames the Senate for the DHS shutdown, impacting TSA agents and causing long security lines at airports.
Privacy professionals
fromElectronic Frontier Foundation
1 month ago

The Anthropic-DOD Conflict: Privacy Protections Shouldn't Depend On the Decisions of a Few Powerful People

Privacy protection depends on corporate contract negotiations rather than legal frameworks, requiring Congress and courts to establish enforceable restrictions on government surveillance and data use.
Information security
fromZDNET
2 weeks ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
Law
fromBusiness Matters
1 month ago

How Unexpected Workplace Incidents Can Disrupt Business Continuity

Unexpected workplace incidents can quickly disrupt operations, creating legal liability, staffing strain, lost momentum, and eroded trust for small and mid-sized businesses.
Gadgets
fromNextgov.com
1 month ago

When every second counts: government tech helps first responders' lifesaving missions

Indoor-capable drones and indoor location-tracking technologies significantly improve first responder situational awareness and reduce risk in hazardous interior environments.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Startup companies
fromEntrepreneur
1 month ago

Why the Real Test of Leadership Is What Happens Without You

A business is scalable only when it can run without its founder; succession requires systems and access, not personal trust or family ties.
fromBuzzFeed
1 month ago

First Responders Are Calling Out The "Fatal" Safety Mistakes You Should Never, Ever Make

If you are choking and are alone, try to get yourself into a high-traffic area, such as a hallway in a building or outside your house. If you pass out, you're way more likely to be found as opposed to being in a room in a building or your house. Call 911 even though you can't speak. Someone will be sent to your location by dispatch.
Public health
Information security
fromSecuritymagazine
3 weeks ago

Discussing Use of Force in Security: A Challenging Discussion?

Use of force in security cannot be entirely avoided but should be deployed only as a last resort when lesser options fail, requiring comprehensive training in tactics, de-escalation, and legal authority.
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
Environment
fromwww.theguardian.com
1 month ago

National security plans must adapt to avoid new world disorder', says UN climate chief

National security strategies that ignore the climate crisis leave countries vulnerable to famine, displacement, conflict, and energy instability; renewables are essential for security.
Information security
fromSecuritymagazine
3 weeks ago

Why Security Culture Metrics Matter More Than Dashboards

Traditional cybersecurity metrics create false confidence by masking hidden risks; culture metrics measuring employee engagement and responsiveness are essential for actual security effectiveness.
Information security
fromSecurityWeek
3 weeks ago

How to 10x Your Vulnerability Management Program in the Agentic Era

Agentic AI cyberattacks are actively occurring, forcing vulnerability management to evolve from static scanning to continuous, contextual, autonomous remediation systems.
#ai-regulation
fromFast Company
1 month ago
US politics

Pentagon follows through with its threat, labels Anthropic a supply chain risk 'effective immediately'

fromFast Company
1 month ago
US politics

Pentagon follows through with its threat, labels Anthropic a supply chain risk 'effective immediately'

Information security
fromSecuritymagazine
1 month ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
fromDataBreaches.Net
1 month ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
US politics
fromNextgov.com
1 month ago

Bipartisan lawmakers worried about shaky progress on modernized government worker background check system

The National Background Investigation Services system for federal employee vetting faces a decade-long delay until fiscal 2028, costing $2.4 billion with $2.2 billion more needed, impacting national security and government contractors.
Information security
fromTechzine Global
1 month ago

Cyber resilience gap: High confidence, but reality lags behind

Organizations invest heavily in cyber resilience but remain vulnerable to external threats due to perimeter-focused strategies that neglect ecosystem-wide protection.
#incident-response
fromSecurityWeek
1 month ago

Four Risks Boards Cannot Treat as Background Noise

Rather than stolen data making headlines, it was business stoppage that triggered attention. Moving into 2026, the board's focus should be on ensuring business continuity and building resilience in the face of emerging risks generated by AI usage and attack vectors, quantum computing and geopolitics.
Information security
fromSecuritymagazine
1 month ago

Strategies for Security Leaders in the Midst of Skill Shortages

Organizations have reported heightened cybersecurity risks as a result of these skill shortages, but the issues don't end there. Many teams will also experience burnout, which is an issue for security teams even in the best of times, which can only add to the talent gap concern if burnt out employees leave the industry.
Information security
Information security
fromThe Hacker News
1 month ago

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage failures occur when decisions are made without execution evidence, causing false positives, missed threats, and higher costs; interactive sandboxes enable evidence-backed verdicts within seconds.
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
fromSecuritymagazine
1 month ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
Information security
fromSecuritymagazine
2 months ago

Grid Protection in Severe Weather: What Security Leaders Need to Know

A major winter storm severely strained U.S. power systems, creating disruptions that cybercriminals exploited by targeting existing infrastructure weaknesses.
Information security
fromwww.housingwire.com
2 months ago

Reducing risk: The importance of administrative access responsibilities

Clearly defined and strictly managed administrative access reduces cybersecurity risk while preserving operational efficiency in real estate, title insurance, and mortgage systems.
Information security
fromTechzine Global
2 months ago

From vulnerability whack-a-mole to strategic risk operations

Shift security from counting vulnerabilities to strategic risk operations that prioritize exposure, value at risk, and measurable business outcomes.
Information security
fromSecuritymagazine
1 month ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
Information security
fromNextgov.com
2 months ago

Building government resilience in an era of AI-driven cyberattacks

Governments must rapidly transform defenses to counter escalating, stealthy AI-driven cyberattacks and prepare for destructive operations targeting critical infrastructure.
fromThe Hacker News
2 months ago

Securing the Mid-Market Across the Complete Threat Lifecycle

For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done. The challenge is that many security tools add complexity and cost that most mid-market businesses can't absorb. With limited budgets and lean IT and security teams, organizations often focus on detection and response.
Information security
[ Load more ]