POPULARITY
As generative AI increasingly takes hold across the federal government, a class of that greater tech discipline called agentic AI is also gaining momentum. Think of it like an AI sidekick. Agentic AI moves beyond rules-based AI assistants of the past to act autonomously to accomplish something without the need for constant human intervention. According to Jonathan Alboum, federal CTO of ServiceNow and a former federal CIO at USDA, agentic AI holds massive potential for the future of the federal government, particularly amid the Trump administration's slashing of the federal workforce and placing a premium on efficiency. Alboum joins the podcast to discuss that, some exciting news from ServiceNow's Knowledge conference this week in Las Vegas and his thoughts on how federal CIOs are managing ongoing consolidation of federal IT programs. President Donald Trump's fiscal 2026 budget proposal would slash $491 million from the budget of the Cybersecurity and Infrastructure Security Agency, according to a summary released Friday. That would amount to a nearly 17% reduction to the agency's approximately $3 billion budget. The administration did not release a detailed itemization of the cuts, only an outline. “The Budget refocuses CISA on its core mission — Federal network defense and enhancing the security and resilience of critical infrastructure — while eliminating weaponization and waste,” a summary reads. In broad strokes, if approved by Congress, the budget would target for reduction what it identified as “so-called” disinformation and misinformation programs and offices; “duplicative” programs of other programs at the state and federal level; “external engagement offices such as international affairs”; and consolidate “redundant security advisors and programs.” A startup founder and Department of Government Efficiency associate named Sam Corcos is the new chief information officer of the Treasury Department, according to a person within the agency. Corcos was introduced with that title at a recent meeting for Treasury bureau chief information officers, the person added. Corcos, who most recently helped create a health company called Levels, had been representing DOGE in the Treasury Department, with the official title of special advisor. Corcos, who has appeared on Fox News with Treasury Secretary Scott Bessent, has said his top priority is looking at the operations and maintenance budget, as well as modernization, at the IRS. He's also sought access to government data and, according to Wired, was involved in an effort to organize an IRS hackathon. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
Melissa Rogers joins the podcast for a conversation about how each of us can take steps to promote religious freedom and the common good in the United States today. After leading the White House Office of Faith-based and Neighborhood Partnerships in the Obama and Biden administrations, she shares her inside perspective on government, where we are right now, and how people can truly make an impact. Our religious freedom protects everyone's right to bring their faith to the public square, and you won't want to miss this conversation about opportunities we have as Americans to engage government at all levels and express ourselves in the face of injustice. SHOW NOTES Segment 1 (starting at 00:38): The genius of our constitutional protections for religious freedom Melissa Rogers served as the executive director of the White House Office of Faith-based and Neighborhood Partnerships in the Obama and Biden administrations. You can click here to read her extensive biography. She is the author of Faith in American Public Life, published in 2019. She has been on two earlier BJC podcasts: Respecting Religion, S2, Ep. 06: What's next? The Biden administration and religious liberty (2020) The Dangers of Christian Nationalism series, episode 9: Religious freedom, church-state law and Christian nationalism (2019), alongside Rabbi David Saperstein. You also can watch a video of that podcast. NOTE: On April 21, we released a special podcast episode recorded at the same time as this conversation, focusing on the case of Kilmar Armando Abrego Garcia and the rule of law. Click here to hear that portion of the conversation. Segment 2 (starting at 10:09): Our current moment as a country Here are links with more information from this portion of the conversation: Melissa discussed the work of the federal government to protect places of worship. Protecting Houses of Worship is a helpful resource on this topic from the CISA (the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security). She also mentioned the Biden-Harris administration's work on countering hate. One example is the United We Stand Summit in 2022: Taking Action to Prevent and Address Hate-Fueled Violence and Foster Unity. Click here to read more about the summit, or click here to watch the full summit proceedings. In addition, the Biden-Harris administration released the U.S. National Strategy to Counter Antisemitism in 2023, and the U.S. National Strategy to Counter Islamophobia and Anti-Arab Hate in 2024. Learn more about BJC's Christians Against Christian Nationalism campaign at ChristiansAgainstChristianNationalism.org. Segment 3 (starting 16:52): Practical ways to take action Here are a few resources and organizations to connect with if you are interested in responding to governmental actions, including by sharing information about their impact on you or your community: DOGE cuts: Have you been impacted by DOGE cuts? Share your story with the Center for American Progress Article published by The Century Foundation: We Led Federal Agencies. Here Are 10 Ways That President Trump and Elon Musk's Attacks on Federal Workers Will Hurt You by Mark Zuckerman, Julie Su, Lauren McFerran, Gayle Goldin, Rachel West, Chiquita Brooks-LaSure, Ruth Friedman, Carole Johnson, Viviann Anguiano, Kayla Patrick and Loredana Valtierra Information on various lawsuits challenging governmental actions: Melissa mentioned the lawsuit challenging the recission of the “sensitive locations” guidance as a violation of religious freedom protections under the federal Religious Freedom Restoration Act (RFRA). Read more about the lawsuit on our website, which is being led by Democracy Forward. Another lawsuit on sensitive locations is also being pursued by a group led by the Institute for Congressional Advocacy and Protection. You can find more information about this and other pending lawsuits here: Updates from Democracy Forward Just Security's litigation tracker Legal actions of CREW (Citizens for Responsibility and Ethics in Washington) Resource on how to protect democracy: Protecting Democracy's Faithful Fight Toolkit Interested in calling your congressional representatives about issues you care about? Here's how you can find their contact information: Click here to find your representative in the U.S. House Click here to find your U.S. Senators Respecting Religion is made possible by BJC's generous donors. Your gift to BJC is tax-deductible, and you can support these conversations with a gift to BJC.
Today on the show, Liz Wheeler interviews Mike Benz, Executive Director of Foundation For Freedom Online about the deep state and the Cybersecurity and Infrastructure Security Agency, better known as CISA. SPONSORS: PREBORN: Your tax-deductible donation of twenty-eight dollars sponsors one ultrasound and doubles a baby's chance at life. How many babies can you save? Please donate your best gift today– just dial #250 and say the keyword, “BABY" or go to https://preborn.com/LIZ. KEKSI COOKIES: Mother's Day is coming up so don't wait—go to https://keksi.com right now and use code LIZ15 for an exclusive 15% discount. Your mom deserves the best—give her something she'll remember! Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of 'Cybersecurity Today,' host Jim Love discusses various pressing topics in the realm of cybersecurity. Highlights include Anthropic's prediction on AI-powered virtual employees and their potential security risks, Microsoft's introduction of AI security agents to mitigate workforce gaps and analyst burnout, and a pivotal court ruling allowing a data privacy class action against Shopify to proceed in California. Additionally, the show covers the last-minute extension of funding for the Common Vulnerabilities and Exposures (CVE) program by the US Cybersecurity and Infrastructure Security Agency, averting a potential crisis in cybersecurity coordination. These discussions underscore the evolving challenges and solutions within the cybersecurity landscape. 00:00 Introduction and Overview 00:26 AI Employees: Opportunities and Risks 01:48 Microsoft's AI Security Agents 03:58 Shopify's Legal Battle Over Data Privacy 05:12 CVE Program's Funding Crisis Averted 07:24 Conclusion and Contact Information
Chris Krebs is a well-known figure in the cybersecurity space. As the former head of the Cybersecurity and Infrastructure Security Agency, Krebs was responsible for directing security for the US federal government starting 2018. Krebs was fired from CISA in 2020 by President Donald Trump for his stance on the 2020 election. Last week, President Trump stripped Krebs of his security clearances for this 4-year-old issue. Krebs then announced that he would be stepping down from his role at security company SentinelOne in order to prevent the company from being harmed by what appears to be a personal issue between the president of the United States and a private citizen that dared to disagree with him. Time Stamps: 0:00 - Welcome to the Rundown0:55 - Zoom Comes to a Halt for 90 Minutes2:47 - VMware Brings Back Free ESXi6:00 - AI Can Write Code, But Struggles With Debugging8:05 - Hammerspace Gains Investors for AI Data Performance Standard11:32 - Google Ad Tech Deemed Monopolized by Federal Judge13:47 - HPE Stake Rises with Elliott Engagement17:45 - Chris Krebs Resigns from SentinelOne24:25 - The Weeks Ahead26:16 - Thanks for Watching Guest Host: Romeo Gardner, President and CEO of NehlosLinkedIn: https://www.linkedin.com/in/romeog/Hosts: Tom Hollingsworth: https://www.linkedin.com/in/networkingnerd/Stephen Foskett: https://www.linkedin.com/in/sfoskett/Alastair Cooke: https://www.linkedin.com/in/alastaircooke/Follow Tech Field Day: Website: https://techfieldday.com/ LinkedIn: https://www.linkedin.com/company/tech-field-day/X/Twitter: https://x.com/TechFieldDay Bluesky: https://bsky.app/profile/techfieldday.com
Labor Department employees can now access two OpenAI models through the company's partnership with Microsoft Azure, making the agency the latest to integrate generative AI into its workflow. The two OpenAI models now available to Labor staff are GPT-4o and GPT-4o mini, according to documents viewed by FedScoop. The agency's platform for the OpenAI tech suggests that staff use the technology for specific applications, including a language translator, a “pros and cons analyzer,” and a memo writer. A large document analyzer and document comparison tool are also available in the interface. Along with that, the department has published a guide on the appropriate use of AI systems and cautions agency users that their role in properly using the generative AI tools is “crucial.” Staff are flagged with a warning before using the tool and are instructed to review outputs for accuracy. Previously, these kinds of generative AI tools had not been approved for Labor Department use and employees were warned not to enter federal information into the systems, a source within the agency told FedScoop. Two top officials at the Cybersecurity and Infrastructure Security Agency who worked with the private sector to manufacture secure products and technology are leaving the agency. Bob Lord, senior technical adviser and Lauren Zabierek, senior advisor at CISA, were two of the chief architects behind CISA's Secure by Design initiative, which garnered voluntary commitments from major vendors and manufacturers to build cybersecurity protections into their products at the design stage. On Monday in separate posts on LinkedIn, Lord and Zabierek both said they are departing the agency. Neither offered a rationale or motivation for the decision, with Lord simply calling it a “difficult decision” and Zabierek saying it was “not an easy choice.” The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
A federally funded cyber security program used by organizations throughout the world nearly shut down. Last week, the Cybersecurity and Infrastructure Security Agency finally inked a last minute contract extension to keep the Common Vulnerabilities and Exposures program up and running. Well now the cyber security community itself is debating whether reforms are needed to that CVE system. Federal News Network's Justin Doubleday joins me with what's going on here. Learn more about your ad choices. Visit podcastchoices.com/adchoices
A federally funded cyber security program used by organizations throughout theworld nearly shut down. Last week, the Cybersecurity and Infrastructure Security Agency finally inked a last minute contract extension to keep the Common Vulnerabilities and Exposures program up and running. Well now the cyber security community itself is debating whether reforms are needed to that CVE system. Federal News Network's Justin Doubleday joins me with what's going on here. Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
As a candidate for president, Donald Trump constantly complained about the “weaponization” of the Justice Department, arguing that its prosecution of him was politically motivated. But as president, Trump has weaponized the entire federal government, to investigate and punish those he considers the “enemy from within” — whether it is current or former employees of the government, law firms that have crossed him, states and cities that cross him, universities that value academic freedom that he wants to squelch, or judges that rule against him. During Trump's first term, Chris Krebs ran the Cybersecurity and Infrastructure Security Agency. After the...Article Link
Protect Your Retirement W/ a Gold or Silver IRA Today!! https://www.sgtreportgold.com/ CALL( 877) 646-5347 - Noble Gold is Who I Trust Gold continues to soar to new all-time highs on a daily basis and the U.S. stock market continues to trend lower amidst tariff turmoil. Donald J. Trump is calling the Democrats the "T" word "TRAITORS" while specifically targeting one deep state snake, Christopher Krebs who was the Director of the Cybersecurity and Infrastructure Security Agency under Biden, Mr. Krebs must now lawyer up because he's going down. Meanwhile Michigan Governor Gretchen Whitmer bent the knee in the oval office. Jim Willie joins me to process the latest! https://rumble.com/embed/v6pqx7h/?pub=2peuz
Customs and Border Protection's Office of Information Technology says it's reviewing the loss of three physical servers, a public records request shows. According to a document produced by CBP's Cybersecurity Directorate, about 200 government devices have been stolen or gone missing in recent years. Of these devices, 140 were cell phones, and just under 40 were laptops. No items were reported to be lost abroad, according to the document. That federal employees would have lost phones and tablets isn't surprising. FedScoop has reported on lost electronics at the U.S. Agency for International Development and NASA, and agencies often review inventories of employee devices. Still, the loss of government-furnished equipment can raise concerns about the security of sensitive data. Some federal employees have even been caught stealing government IT equipment in order to sell it. The loss of three servers is somewhat unusual. The agency did not answer a series of questions about the lost servers, including what data they might have held or whether the losses were ever reported to law enforcement. In response to FedScoop questions, an agency spokesperson said, “CBP is currently reviewing this issue.” The Cybersecurity and Infrastructure Security Agency must brief Congress on proposed deep cuts to agency personnel, a top Democrat said in a letter to its acting director. California Rep. Eric Swalwell, ranking member of the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection, wrote in the letter to acting Director Bridget Bean on Thursday that CISA is obligated to notify Congress of its plans. CISA reportedly plans to cut agency staff by nearly 40%, or 1,300 people. Swallwell wrote in his letter that “upending an agency that plays such an important role in defending the homeland while keeping Congress in the dark is wholly unacceptable,” adding that CISA hasn't provided the subcommittee any justification for the cuts or explained how it will execute its congressionally mandated mission with a fraction of the workforce and resources. CISA had already cut 130 probationary staffers, a move blocked in court before being overturned in an appeal. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
John is joined by former U.S. Cybersecurity and Infrastructure Security Agency director Chris Krebs to discuss the Trump 2.0 rollback of the nation's cyberdefenses—an interview taped just an hour before Trump ordered the Justice Department to investigate Krebs, who earned the president's enmity four years ago by declaring the 2020 election “the most secure in American history.” Krebs details the rapidly escalating and dramatically expanding threats posed by Chinese and Russian hackers to America's corporations, public and private infrastructure, and voting systems; how and why the administration is dismantling the agencies and programs designed to stave off those threats; and the potential risks to the security of our elections as a result of gutting CISA, the organization Krebs once led … and Trump himself signed into law. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
Qasim Ijaz Qasim Ijaz is the director of cybersecurity at a leading healthcare organization, overseeing detection, incident response, vulnerability management, purple teaming, and cybersecurity engineering. With a strong background in offensive security and risk management, he has helped organizations strengthen their defenses against evolving threats. He is also a dedicated educator, mentoring professionals and sharing his expertise at conferences such as BSides and Black Hat. You don't need to go far in the news these days to find out that another organization was hacked. Data breeches are a nightmare scenario for both leaders and the people they support. In this episode, Qasim and I explore what your team and you can do to be a bit more prepared. Key Points Use multi-factor authentication, passphrases, and a password manager. Freeze your personal credit reports. Do this for free directly with Experian, Equifax, and TransUnion. Leaders in bigger roles (executives, CEOs, board members) are larger targets for hackers due to their access and also their ability to occasionally side-step organizational guidelines. It's the non-technical pieces of a cyber response that organizations are least prepared for. Conduct incident response and disaster recovery tabletop exercises to uncover vulnerabilities before an attack. Regardless of organizational policy, employees will use AI. The best prevention assumes the inevitability of human behavior and works with it to improve systems. Resources Mentioned Recommended password managers: 1Password, Apple password app, Proton Pass Critical Security Controls by the Center for Internet Security Resources for Small and Medium Businesses by the Cybersecurity & Infrastructure Security Agency 2024 Data Breach Investigations Report by Verizon Business Related Episodes Dumb Things Smart People Do With Money, with Jill Schlesinger (episode 396) Where to Start When Inheriting a Team in Crisis, with Lynn Perry Wooten (episode 603) How to Use AI to Think Better, with José Antonio Bowen (episode 689) Discover More Activate your free membership for full access to the entire library of interviews since 2011, searchable by topic. To accelerate your learning, uncover more inside Coaching for Leaders Plus.
Members of Elon Musk's Department of Government Efficiency now have access to technical systems maintained by United States Citizenship and Immigration Services, according to a recent memorandum viewed by FedScoop. The memo, which was sent from and digitally signed by USCIS Chief Information Officer William McElhaney, states that Kyle Shutt, Edward Coristine, Aram Mogahaddassi and Payton Rehling were granted access to USCIS systems and data repositories, and that a Department of Homeland Security review was required to determine whether that access should continue. Coristine, 19, is one of the more polarizing members of DOGE. He previously provided assistance to a cybercrime ring through a company he operated while he was in high school, according to other news outlets. Coristine worked for a short period at Neuralink, Musk's brain implant company, and was previously stationed by DOGE at the Cybersecurity and Infrastructure Security Agency. The memo, dated March 28, asks DHS Deputy Secretary Troy Edgar to have his office review and provide direction for the four DOGE men regarding their access to the agency's “data lake” — called USCIS Data Business Intelligence Services — as well as two associated enabling technologies, Databricks and Github. The document says DHS CIO Antoine McCord and Michael Weissman, the agency's chief data officer, asked USCIS to enable Shutt and Coristine's access to the USCIS data lake in mid-March, and Mogahaddassi requested similar access days later. A bipartisan bill to fully establish a National Science Foundation-based resource aimed at providing essential tools for AI research to academics, nonprofits, small businesses and others was reintroduced in the House last week. Under the Creating Resources for Every American To Experiment with Artificial Intelligence (CREATE AI) Act of 2025 (H.R. 2385), a full-scale National AI Research Resource would be codified at NSF. While that resource currently exists in pilot form, legislation authorizing the NAIRR is needed to continue that work. Rep. Jay Obernolte, R-Calif., who sponsors the bill, said in a written statement announcing the reintroduction: “By empowering students, universities, startups, and small businesses to participate in the future of AI, we can drive innovation, strengthen our workforce, and ensure that American leadership in this critical field is broad-based and secure.” The NAIRR pilot, as it stands, is a collection of resources from the public and private sectors — such as computing power, storage, AI models, and data — that are made available to those researching AI to make the process of accessing those types of tools easier. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
GUEST: Former Secretary of State Kim Wyman on the SAVE Act, Trump's EO on voting and cuts to the Cybersecurity and Infrastructure Security Agency // GUEST: Jillian Raftery on a restorative justice success story gone wrong //
The Department of State is continuing to expand its artificial intelligence chatbot known as StateChat, including working toward a mobile version and the ability to query internal messages called cables. That's what John Silson, director of analytics in the State Department's Center for Analytics, recently told FedScoop reporter Madison Alder during an SNG Live event on AI and Automation. During the conversation, they touched on how State is continuing to iterate on StateChat, how the department is working to maxmize adoption, the importance of context in prompting and what comes next. Defense Secretary Pete Hegseth is reopening the deferred resignation program and also offering early retirement to eligible civilian workers as he seeks to “maximize participation.” Hegseth signed a memo on Friday, “Initiating the Workforce Acceleration and Recapitalization Initiative,” that was directed to senior Pentagon leadership, combatant commands, and defense agency and field activity directors. The move comes as department leaders are looking to shed civilian employees and reinvest the savings elsewhere as part of the Trump administration's Department of Government Efficiency efforts. Hegseth said DOD is offering the deferred resignation opportunity, as well as Voluntary Early Retirement Authority, to all eligible civilian employees, noting that exemptions wil be rare. He wrote in a March 28 memo: “My intent is to maximize participation so that we can minimize the number of involuntary actions that may be required to achieve the strategic objectives.” Karen Evans, a longtime government IT official who previously held the role that preceded the creation of the federal chief information officer, was nominated last week to serve as undersecretary for management at the Department of Homeland Security. Evans, whose nomination has been referred to the Senate Homeland Security and Governmental Affairs Committee, joined the Trump administration earlier this year as executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency. Evans' role at CISA was one of the most prominent cyber jobs in the federal government, leading the agency's “mission to protect and strengthen federal civilian agencies and the nation's critical infrastructure against cyber threats,” per an official description of the position. Before joining CISA, Evans spent the previous three-plus years working as the managing director of the Cyber Readiness Institute, a nonprofit geared toward educating and creating free cyber tools for small- and medium-sized businesses. For much of George W. Bush's administration, Evans served as administrator of the Office of Electronic Government and Information Technology. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
Jährlich wird von der Cybersecurity and Infrastructure Security Agency (kurz CISA) die Liste der Top Sicherheitsschwachstellen veröffentlicht. Hat sich dabei die Situation gross verändert? Oder sind die bekannten Schwachstellen wieder auf den Top-Plätzen. Darüber diskutieren Andreas Wisler und Sandro Müller.
In this episode of 'Cybersecurity Today,' host Jim Love covers several major cybersecurity events. A devastating breach at Oracle Cloud Infrastructure has exposed 6 million records affecting 140,000 businesses, linked to a threat actor known as Rose87168. The attack exploited vulnerabilities in Oracle Fusion Middleware 11G. New browser-in-the-middle attack techniques are discussed, which can steal data by bypassing multi-factor authentication. The episode also highlights a severe vulnerability in Synology's DiskStation Manager software that could allow remote attackers to take full control of affected systems. Lastly, significant budget cuts in the Cybersecurity and Infrastructure Security Agency's (CISA) Red Team might weaken US government cyber defenses. Critical insights and mitigation strategies for these emerging threats are provided. 00:00 Massive Oracle Supply Chain Attack 03:08 Browser in the Middle Attack Explained 06:03 Synology's Major Security Flaw 08:08 US Government Red Team Disruptions 10:31 Conclusion and Final Thoughts
Everything, everywhere, all at once — but not the movie. This is how cybersecurity experts describe a scenario where a foreign adversary shuts off critical infrastructure, like oil pipelines, water networks, ports, and electric grids, all over the country. The terrifying truth is that China has already hacked into our critical infrastructure. They're “living off the land” and could conceivably attack whenever is most convenient. What's worse? Our political leaders are defunding America's cybersecurity efforts. In order to dig in deeper, Kara talks to Nicole Perlorth, Michael Schmidt, and Lt. Col. Alexander Vindman, (Ret.) Nicole Perlroth spent a decade as the lead cybersecurity reporter at The New York Times, before going inside the tent and joining the advisory board of the Cybersecurity and Infrastructure Security Agency and the Council on Foreign Relations' Cyber Task Force. She is a founding partner at Silverbuckshot Ventures and the host and producer of To Catch a Thief, a new podcast on China's rise to cyber dominance. Michael Schmidt is a Pulitzer Prize-winning investigative reporter for The New York Times and the author of the best-selling book Donald Trump v. The United States. He's also the executive producer and co-creator of the Netflix series Zero Day, a political thriller about a devastating cyberattack on the U.S. Lt. Col. Alexander Vindman is the former director of European Affairs for the National Security Council. Vindman was a key witness during President Trump's first impeachment and testified about Trump's infamous phone call with President Zelensky of Ukraine. He is a senior fellow at the Johns Hopkins Foreign Policy Institute and the author of The Folly of Realism: How the West Deceived Itself About Russia and Betrayed Ukraine. Questions? Comments? Email us at on@voxmedia.com or find us on Instagram, TikTok and Bluesky @onwithkaraswisher. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Cybersecurity Today: From DDoS Attacks to Developer Sabotage In today's episode, host Jim Love discusses several major cybersecurity incidents: the pro-Palestinian group Dark Storm's claimed DDoS attack on X Twitter and its implications; the impact of budget cuts from the Department of Government Efficiency on the US Cybersecurity and Infrastructure Security Agency; the recovery of $23 million from the Ripple wallet hack allegedly linked to the LastPass breach; New York State's lawsuit against Allstate Insurance for inadequate data security and resultant breaches compromising 200,000 individuals' data; and finally, the conviction of a developer who sabotaged his employer's systems post-termination. The episode underscores the importance of robust cybersecurity measures and responsible handling of personnel changes. 00:00 Pro-Palestinian Group Claims Credit for Twitter Outage 02:51 US Cybersecurity Agency Faces Devastating Cuts 04:23 US Authorities Recover $23 Million from Cryptocurrency Hack 06:31 New York Sues Allstate Over Data Breaches 09:12 Developer Sentenced for Malicious Code Sabotage 11:34 Support the Podcast
CYBER.ORG is a cybersecurity workforce development organization advancing K-12 cybersecurity education nationwide through no-cost curriculum and teacher professional development resources. Supported by the U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency through the Cybersecurity Education and Training Assistance Program (CETAP) grant. CYBER.ORG provides educators and caregivers with resources and training to teach cybersecurity education to K-12 students nationwide. Today, over 30,000 teachers across all 50 states and four U.S. territories are enrolled in the CYBER.ORG's content platform. Dr. Laurie Salvail serves as the Executive Director of CYBER.ORG, the Academic Division of the Cyber Innovation Center. Laurie leads the CYBER.ORG team as they seek to bring cyber education to K-12 teachers. She has over 12 years of classroom experience and has a PhD in curriculum and instruction from Louisiana State University. On this episode, Laurie shares how schools and educators nationwide are currently incorporating cybersecurity education into K-12 classrooms, ideas and resources for incorporating it into your school, and how this ultimately will address the growing need for skilled cyber professionals.Be sure to check out CYBER Range, or find lessons about coding, encryption, & more!(learn more about Cyber.org on Ep 230Connect with Laurie & Cyber.org:Website: CYBER.ORGInfo about Cyber EdCon in ChicagoCareer profiles and cards Twitter/X: @cyber_dot_orgChris Woods is the host of the STEM Everyday Podcast... Connect with him:Website: dailystem.comTwitter/X: @dailystemInstagram: @dailystemYouTube: @dailystemGet Chris's book Daily STEM on AmazonSupport the show
When the Trump administration began sidelining and laying off personnel at the Cybersecurity and Infrastructure Security Agency, it started by targeting employees who worked on election security and disinformation. At the same time, the Department Homeland Security announced it would conduct a comprehensive review of CISA's election security mission. Last week, the agency confirmed that it has completed the review, but said that its findings won't be released to the public. A spokesperson for the agency said: “The assessment that CISA has undertaken is internal and will help inform how the agency moves forward to best support critical infrastructure. This is an internal document that is not planned to be released publicly.” A DHS spokesperson told CyberScoop in an email that the department had nothing else to share at this time. Secretary Pete Hegseth is directing all Defense Department components to embrace a rapid software acquisition pathway and use commercial solutions opening and Other Transaction authority to speed up the procurement of digital tools for warfighters. The department's Software Acquisition Pathway was set up during the first Trump administration under then Undersecretary of Defense for Acquisition and Sustainment Ellen Lord as part of a broader push for a so-called Adaptive Acquisition Framework that enables the department to procure software differently than it buys hardware. Programs on that pathway are not subject to some of the encumbrances associated with the Joint Capabilities Integration and Development System and major defense acquisition program designations. Now, Hegseth wants to make sure all DOD components are taking advantage of the pathway.
Early in the morning on March 1, without notice, the General Services Administration eliminated its 18F program, what was an internal team of tech consultants and engineers that developed open-source tools to improve digital services across the federal government. Just short of its 11th birthday, 18F had grown to be a staple in the federal government's digital services development and acquisition space. Now when you type in "18F.gov" to visit its website, you're met with an error message. The team has been completely wiped from the face of the federal government. GSA hasn't given much reasoning for the termination. Thomas Shedd, head of the agency's Technology Transformation Services organization that housed 18F, said during a town hall last week that the decision was based purely on its reported cashflow struggles and that it hadn't been cost-recoverable. Dan Tangherlini, former GSA administrator when 18F was founded, joins the Daily Scoop to share his thoughts on what 18F meant to good government, the legacy of the organization, and how GSA will continue to serve as the federal government's center of tech excellence without this key team moving forward. Roughly a month after being replaced as acting CIO of the Department of Energy, Principal Deputy CIO Dawn Zimmer is now back serving in the department's top IT role, multiple sources familiar with the change confirmed to FedScoop. Zimmer is filling the CIO position for the second time since Inauguration Day after Ryan Riedel briefly took on the role overseeing the department's $4.3 billion IT portfolio in early February. As FedScoop first reported, Zimmer returned to her primary role as principal deputy CIO at Energy when Riedel, previously a network engineer at Elon Musk-owned SpaceX, was appointed to the CIO role. She took over the acting CIO role after Biden administration Energy CIO Ann Dunkin stepped down at the change of administrations. It's unclear why Riedel departed the role after just over a month. The Energy Department did not return questions about his short tenure. President Donald Trump nominated Sean Plankey to head the Cybersecurity and Infrastructure Security Agency on Tuesday, the last major piece to fall into place for cybersecurity leadership in his administration. Plankey served in the first Trump administration, holding a few posts with cyber responsibilities. He was the principal deputy assistant secretary for the Energy Department's Office of Cybersecurity, Energy Security and Emergency Response in 2019 and 2020. Before that he was director of cyber policy at the National Security Council, starting in 2018. He has most recently been at the global cybersecurity advisory company WTW. Plankey was briefly under consideration in 2020 to lead the agency he's now nominated to be director of after Trump forced Chris Krebs out of the role. He had long been thought to be Trump's pick this time around, too. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
Unlock the secrets behind the transformative power of artificial intelligence, the buzz around DeepSeek, and the impact of AI-generated books on human creativity. As we relay insights from the Artificial Intelligence Action Summit in Paris, discover how global leaders and tech experts are shaping the future of AI. We also touch on the intriguing and somewhat humorous endeavor of AI trying its hand at writing, and the serious implications it holds for the creative industry. Meanwhile, pressing cybersecurity concerns underscore a pivotal moment for the Cybersecurity and Infrastructure Security Agency, with staffers urged to hold off on resignations amid federal downsizing.Get ready to have your curiosity piqued as we explore the fascinating world of smart glasses. Gwen Way returns with two must-see gadgets that add another layer of excitement for our tech-savvy audience. We also delve into personal experiences with Chinese online marketplaces like Temu, reflecting on the challenges of product fulfillment and what it means for global commerce.Is the Amazon Alexa subscription service worth the buzz or just another case of subscription fatigue? As we look forward to Amazon's upcoming event, we explore the potential of Alexa's new capabilities and the reaction to a possible $10 monthly fee. From our entertaining whiskey-tasting session to the nostalgic origins of the term "podcast," we promise a memorable journey through technology's latest trends and debates. Tune in for a blend of insightful analysis, engaging segments like Mike's Mesmerizing Moment and Nathan's Nugget, and of course, our top-of-the-month whiskey tasting, all designed to keep you connected and informed.Support the show
Federal employees would be banned from using the Chinese artificial intelligence platform DeepSeek on their government-issued devices under new legislation from a bipartisan group of House lawmakers. The No DeepSeek on Government Devices Act, introduced by Reps. Josh Gottheimer, D-N.J., Darin LaHood, R-Ill., and 16 of their House colleagues Friday, comes after weeks of panic in Silicon Valley following the revelation that the Chinese startup's AI models were comparable if not more advanced than offerings from U.S. companies. DeepSeek, a low-cost, open-source AI model, has since reported difficulties in registering new users thanks to “large-scale malicious attacks” on its services. The Cybersecurity and Infrastructure Security Agency placed several members of its election security group on administrative leave last week, multiple sources familiar with the situation told CyberScoop. According to one source, the moves happened Thursday and Friday of last week and were targeted at employees focused on CISA's mis-, dis- and malinformation teams. The moves include four employees currently working on or assigned to the team, two more that left the team in the past four years but still hold positions at the Department of Homeland Security, and another two that work on elections misinformation or disinformation at DHS. A second source confirmed that some, but not all members of CISA's election security team, were placed on leave last week. The extent of the teams impacted by the decree is unclear. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
As Elon Musk and his Department of Government Efficiency pursue sweeping cuts across federal agencies, the Trump administration is also scaling back efforts to confront election disinformation. Several officials in the Cybersecurity and Infrastructure Security Agency, a political target of Republicans since the 2020 election, were recently put on leave. On POLITICO Tech, cybersecurity reporter Maggie Miller joins host Steven Overly to detail the quiet cuts and why others at the agency are worried about their futures. Learn more about your ad choices. Visit megaphone.fm/adchoices
It's national data privacy day! What better day to focus your attention on keeping your data secure than now. Take a couple of moments today and throughout the week to evaluate and safeguard your identity so you can effectively protect yourself from current or future threats. Links: Check out resources from the National Cybersecurity Alliance and the Cybersecurity & Infrastructure Security Agency Learn more about the features and benefits of a Better Checking Account with IDProtect Register or log into our Better Checking portal to access the credit score tracker, credit report and other account benefits Transcript: Welcome to Money Tip Tuesday from the Making Money Personal podcast. One of the most important things you can do for yourself is to take identity and privacy threats seriously. There are new breaches occurring every day that choosing to not take steps for proper security could be costly. It's critical to put guards in place before any threat arises. If you use digital services, tools and technology, National Privacy Day, and Week, is a great time to assess your existing security protocols and determine whether you're adequately protected. With fraud threats everywhere, it's important to remember to stay on top of current scams to keep your privacy secure. Familiarize yourself with common tactics scammers use to trick you as well as stay abreast of new tactics arising. Check out the National Cybersecurity Alliance at Stay Safe Online for up to date information and resources about proper cyber protection. You can also explore resources and tools from the Cyber Security and Infrastructure Security Agency at CISA.gov. Other, more active steps to take involve reviewing your current situation and identifying any areas where security could be improved. Ensure all account passwords are secure, that you have proper PIN or biometric authentication on all devices and that all have been maintained with the most recent updates. Monitor all your credit and credit card information. Make sure you're paying attention to all your credit cards and have sufficient access to card controls to easily turn them off if they're lost or stolen. Set up notifications for immediate awareness any time your cards are used. Receiving a simple message on card usage gives you the ability to act immediately if a suspicious charge occurs. Keep an eye on your credit score for any inconsistencies or anomalies. Familiarize yourself by checking your score and viewing your current credit report. Your credit report will list out all your open credit lines, loans and other information like credit inquiries, payment history and other personal data regarding your credit activity. Look over the report to ensure all the activity is legitimate and accurate. Finally, consider identity theft protection. Having identity theft protection offers benefits that help prevent fraud as well as cover you in case fraud occurs. These services monitor data bases and the dark web for sensitive information that way if any issue arises, you can act swiftly to resolve any issues. They also offer expense reimbursement, case managers and recovery assistance to help all throughout the recovery process. With a Triangle Better Checking account you can get affordable access to amazing identity theft protection benefits for a small monthly fee of $4.99. With this one account you'll gain access to identity theft monitoring, reimbursement coverage, a credit score tracker, credit reporting, card registration as well as reimbursement coverage and full service identity recovery with a case manager if you ever become a victim. To learn more about the benefits and for further account information, visit trianglecu.org. If you already have a Better Checking account you're already enrolled in the protection service but to access the other great benefits register at betterchecking.trianglecu.org to get started there. If keeping your identity and sensitive information is high on your priority list, take some time today or throughout the week to set up additional protections for your devices and identity. If there are any other tips or topics you would like us to cover, let us know at tcupodcast@trianglecu.org. Like and follow our Making Money Personal FB and IG page and look for our sponsor, Triangle Credit Union on social media to share your thoughts. Thanks for listening to today's Money Tip Tuesday and check out our other tips and episodes on the Making Money Personal podcast. Have a great day!
South Dakota Governor Kristi Noem's nomination for homeland security secretary is moving forward in the Senate. The Homeland Security and Governmental Affairs Committee voted 13 to 2 on Monday night to advance Noem's nomination to the Senate floor. Noem will play a key role in overseeing the Trump administration's immigration enforcement and border security policies. She has also pledged to rein in the Cybersecurity and Infrastructure Security Agency's work on mis- and dis-information. The director of the Federal Law Enforcement Training Centers, Benjamine Huffman is currently leading DHS as acting secretary. Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
South Dakota Governor Kristi Noem's nomination for homeland security secretary is moving forward in the Senate. The Homeland Security and Governmental Affairs Committee voted 13 to 2 on Monday night to advance Noem's nomination to the Senate floor. Noem will play a key role in overseeing the Trump administration's immigration enforcement and border security policies. She has also pledged to rein in the Cybersecurity and Infrastructure Security Agency's work on mis- and dis-information. The director of the Federal Law Enforcement Training Centers, Benjamine Huffman is currently leading DHS as acting secretary. Learn more about your ad choices. Visit podcastchoices.com/adchoices
The Cybersecurity and Infrastructure Security Agency, CISA is one of the youngest but also fastest growing agencies in government. It faces a murky future though, under the incoming Trump administration and potentially less support from Congress. For more on what might lie ahead for CISA in 2025 Federal News Network's Justin Doubleday Learn more about your ad choices. Visit podcastchoices.com/adchoices
The Cybersecurity and Infrastructure Security Agency, CISA is one of the youngestbut also fastest growing agencies in government. It faces a murky futurethough, under the incoming Trump administration and potentially less supportfrom Congress. For more on what might lie ahead for CISA in 2025 Federal NewsNetwork's Justin Doubleday Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The Cybersecurity and Infrastructure Security Agency unveiled a detailed set of guidelines Wednesday to safeguard the mobile communications of high-value government targets in the wake of the ongoing Salt Typhoon telecom breach. The guide aims to help both political and federal leadership harden their communications and avoid any data interception by the Chinese-linked espionage group. As of earlier this month, government agencies were still grappling with the attack's full scope, federal officials told reporters. Among the targets were officials from both presidential campaigns, including the phone of President-elect Donald Trump. The advisory details several key practices intended to mitigate risks associated with cyber threats and raise awareness on techniques that can thwart any type of malicious actor. The FBI's ability to fully embrace artificial intelligence has been hamstrung by funding constraints and various workforce and technical challenges, according to a new watchdog report. The Department of Justice Office of the Inspector General said the FBI has “demonstrated initiative” and taken steps to “integrate AI capabilities in a manner consistent” with guidance from the Office of the Director of National Intelligence. But substantial progress has been difficult to come by due to barriers that have “impeded” more “accelerated adoption” of AI. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
A consolidated list of federal artificial intelligence use cases released by the White House on Wednesday shows agencies more than doubled the amount of uses reported last year. Per the 2024 consolidated inventory, which is available on the Office of Management and Budget's GitHub, 37 federal agencies have reported 1,757 public AI uses. A consolidated list released by the White House last year documented 710 use cases. The top three categories of uses, per a Chief Information Officer Council post Wednesday, were “mission-enabling (internal agency support), health and medical, and government services (includes benefits and service delivery).” The consolidated inventory is the product of an annual AI inventory process that was initially established in December 2020 and has continued to evolve. It gives the latest snapshot of how the federal government is handling the rapidly growing technology and reflects the Biden administration's safety-based approach to AI. Federal civilian agencies have a new list of cyber-related requirements to address after the Cybersecurity and Infrastructure Security Agency on Tuesday issued guidance regarding the implementation of secure practices for cloud services. CISA's Binding Operational Directive (BOD) 25-01 instructs agencies to identify all of its cloud instances and implement assessment tools, while also making sure that their cloud environments are aligned with the cyber agency's Secure Cloud Business Applications (SCuBA) configuration baselines. CISA Director Jen Easterly said in a statement that the actions laid out in the directive are “an important step” toward reducing risk across the federal civilian enterprise, though threats loom in “every sector.” The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
In this episode of The Gate 15 Interview, Andy Jabbour speaks with Jeri Rogish and Mitchell Freddura, both with the Cybersecurity and Infrastructure Security Agency (CISA) and CISA's Joint Cyber Defense Collaborative (JCDC). Jeri serves as Deputy Chief of JCDC's Product Development Section and Mitch serves in the Partnerships Office. Jeri on LinkedIn. Mitch on LinkedIn. For further information about participating, email cisa.jcdc@cisa.dhs.gov. Discussed in the podcast: Jeri & Mitch's Backgrounds. JCDC background. How the JCDC is “uniting the global cyber community.” Best practices to support a “coordinated defensive cyber posture.” “Implementing comprehensive, whole-of-nation cyber defense plans” to address risks, coordinate action, and build national resilience. Building a joint understanding of challenges and opportunities for our nation's cyber defense. Networks of networks & private-public partnership The NCIRP Public Comment period coming soon! We play Three Questions and talk moments from high school, favorite foods, big hearts and sports teams no one wants to hear about… Selected links: Joint Cyber Defense Collaborative (JCDC) CISA Launches New Joint Cyber Defense Collaborative (05 Aug 2021) JCDC Success Stories | CISA JCDC Artificial Intelligence Cyber Tabletop Exercise Series Shaping the legacy of partnership between government and private sector globally: JCDC Cybersecurity Resources for High-Risk Communities JCDC Builds Foundation for Pipelines Cyber Defense Planning Effort Additional resources: 2024 JCDC Priorities Enhanced Visibility and Hardening Guidance for Communications Infrastructure PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure Living off the Land (LoTL) Guidance Cybersecurity Resources for High-Risk Communities | CISA Securing Open Source Software in Operational Technology | CISA Improving Security of Open Source Software in Operational Technology and Industrial Control Systems
A new warning is being sent out to Americans to stop sending text messages amid a large-scale breach of U.S. networks by Chinese hackers. The FBI, Cybersecurity and Infrastructure Security Agency, and U.S. Cyber Defense Agency are now telling people to use encrypted apps for chats and phone calls amid the current breach. We'll discuss this topic and others, in this episode of Crossroads. Views expressed in this video are opinions of the host and guests and do not necessarily reflect the views of The Epoch Times. ⭕️
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we dive into the importance of secure phone communications for therapy providers. We discuss: The recently revealed hack of major global telecom providers The difference between secure communications and non-secure communications The difference between HIPAA secure and HIPAA friendly How clients can opt out of secure communications Which VoIP services are HIPAA secure (and which major one isn't) Reframing HIPAA security as client care Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. Resources Article: Chinese hack of global telecom providers is ‘ongoing,' officials warn Officials from the FBI and the Cybersecurity and Infrastructure Security Agency say the major Chinese hack began in late spring, and they are strongly urging Americans to use encrypted communications. PCT Resources Related on-demand CE Training: Smooth and Secure Use of Phone, Text, Email, and Video to Meet Modern Clients Where They Are: Legal-Ethical and Real-World Considerations (3 legal-ethical CE credit hours) Learn about the legal-ethical considerations of modern communication channels in the context of real world practice and client needs. **ideal for leadership PCT's free Group Practice Service Selection Workbook & Worksheets -- support for selecting HIPAA-secure, effective, and economical services to meet your practice's functionality and operational needs optional accompanying on-demand CE training: Designing a Group Practice's Tech Setup for Success: Effectiveness, HIPAA Compliance, Client Safety, and Efficiency (1 legal-ethical CE credit hour) Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours -- including monthly session with therapist attorney Eric Ström, JD PhD LMHC + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks.
The Cybersecurity and Infrastructure Security Agency's new online cybersecurity education platform went live this month. Its goal is to make it easier for federal employees, veterans and anybody else, to get much needed cybersecurity training. For more on the CISA learning platform, Federal News Network's Justin Doubleday spoke with CISA's Chief People Officer Elizabeth Kolmstetter. Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The Cybersecurity and Infrastructure Security Agency's new online cybersecurity education platform went live this month. Its goal is to make it easier for federal employees, veterans and anybody else, to get much needed cybersecurity training. For more on the CISA learning platform, Federal News Network's Justin Doubleday spoke with CISA's Chief People Officer Elizabeth Kolmstetter. Learn more about your ad choices. Visit podcastchoices.com/adchoices
In this week's Security Sprint, Dave and Andy covered the following topics. Warm Start: • Auto-ISAC: Thomas Farmer Assumes Position as Director of Operations • News from the Auto-ISAC Cybersecurity 2024 Summit • Follow Up from last Sprint: FBI Statement Regarding Offensive Text Messages o Bigoted text messages after Trump victory also targeted Latinos, LGBTQ+ communities, FBI says o FBI investigates new wave of offensive messages targeting Hispanic, LGBTQ people • Groundbreaking Framework for the Safe and Secure Deployment of AI in Critical Infrastructure Unveiled by Department of Homeland Security • Media Advisory: Chairman Green Announces Worldwide Threats Hearing Featuring DHS Secretary Mayorkas, FBI Director Wray, NCTC Acting Director Holmgren: November 20, 2024, at 10:00 AM ET • Senate Judiciary Committee: Big Hacks & Big Tech: China's Cybersecurity Threat: November 20, 2024, at 2:00 PM ET Main Topics: Homeland Security Transitions. Rand Paul has plans to kneecap the nation's cyber agency. The incoming chair of the Senate Homeland Security Committee has pledged to severely cut the powers of the Cybersecurity and Infrastructure Security Agency or eliminate it entirely. • CISA Director Jen Easterly to depart on Inauguration Day • House Homeland Releases “Cyber Threat Snapshot” Highlighting Rising Threats to US Networks, Critical Infrastructure • Joint Statement from FBI and CISA on the People's Republic of China (PRC) Targeting of Commercial Telecommunications Infrastructure • Salt Typhoon: T-Mobile Hacked in Massive Chinese Breach of Telecom Networks • Salt Typhoon: Intelligence community briefed Congress on Chinese telecom intrusions • Volt Typhoon rebuilds malware botnet following FBI disruption • China's Hacker Army Outshines America Liability: Legal Report: A Michigan Agency Agrees to $13 Million Settlement Concerning Surprise Active Shooter Drill. Cyber Resilience: • NordPass: Top 200 Most Common Passwords. • 2023 Top Routinely Exploited Vulnerabilities. PDF: AA24-317A 2023 Top Routinely Exploited Vulnerabilities Quick Hits: • Palo Alto! Risky Biz News: Unpatched zero-day in Palo Alto Networks is in the wild. • CISA Adds Two Known Exploited Vulnerabilities to Catalog o CVE-2024-9463 Palo Alto Networks Expedition OS Command Injection Vulnerability o CVE-2024-9465 Palo Alto Networks Expedition SQL Injection Vulnerability • EPA: Management Implication Report: Cybersecurity Concerns Related to Drinking Water Systems. o US EPA report cites cybersecurity flaws in drinking water systems, flags disruption risks and lack of incident reporting o Drinking water systems for 26M Americans face high cybersecurity risks • Moody's Cyber Heat Map flags extreme cyber risks for critical infrastructure, impacting telecommunications and airlines • 35 dead as driver hits crowd at sports center in southern Chinese city • ODNI - Potential Global Economic Consequences of a Use by Russia of Nuclear Weapons in Ukraine • Australia-Japan-United States Trilateral Defense Ministers' Meeting November 2024 Joint Statement • Justice Department Announces Murder-For-Hire and Related Charges Against IRGC Asset and Two Local Operatives • Iranian “Dream Job” Campaign 11.24 • Fans scuffle despite heavy security presence at France-Israel soccer match • Hate, Extremism & Terrorism: o Houston man charged with attempting to provide material support to ISIS o The FBI says it stopped a possible terrorist attack in Houston o California Teenager Pleads Guilty in Florida to Making Hundreds of ‘Swatting' Calls Across the United States o Nazi Group Marches Through Ohio Town o Germany: 17-year-old arrested over alleged terror plot o Teens accused of plotting to bomb pro-Israel rally on Parliament Hill o Man dead after explosions outside Brazil supreme court ahead of G20
Some Republican lawmakers and policy agenda Project 2025 have criticized the Cybersecurity and Infrastructure Security Agency for overreach. WSJ reporter James Rundle joins host Belle Lin to talk about how President-elect Trump's second term might shape the cyber agency, from more robust abilities for it to detect and respond to cyber threats, to drastic budget cuts.Plus, why some techies are taking their meetings and networking events to saunas. Sign up for the WSJ's free Technology newsletter. Learn more about your ad choices. Visit megaphone.fm/adchoices
As voters prepare to head to the polls, former President Donald Trump and Vice President Kamala Harris focus on critical battleground states. CBS News political contributors Terry Sullivan and Joel Payne break down the closing campaign strategies.With Election Day on the horizon, more than 78 million Americans have already made their voices heard. CBS News' chief Washington correspondent Major Garrett dives into the numbers and trends shaping this year's election.CBS News elections and surveys director Anthony Salvanto breaks down where the polls stand with Election Day just one day away."CBS Evening News" anchor and managing editor Norah O'Donnell and chief political analyst John Dickerson break down what to know about the presidential race between Vice President Kamala Harris and former President Donald Trump as the campaigns make their final pitches to voters.The FBI says two fake videos online claim to be from the agency, but they are not. One is about election security, while the other is about Vice President Kamala Harris' husband, Doug Emhoff. U.S. officials think the videos come from a disinformation campaign, backed by Russia. David Becker, the executive director of the Center of Election Innovation and Research, and Chris Kerbs, former director of the Cybersecurity and Infrastructure Security Agency, spoke to "CBS Mornings" about election security.Actor Cole Hauser joins "CBS Mornings" to discuss the return of the hit series "Yellowstone," the Dutton family's fight to protect their land, and his role as Rip Wheeler.Lyn Story, who has been using her old car to offer rides to those in need, was shocked when a generous viewer steps up to give her a brand new vehicle, allowing her to continue her acts of kindness. CBS News correspondant David Begnaud has more.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Today, Martha, Les, Jess, and Jeffrey dive into the issue of election interference by malign actors on the eve of the 2024 Presidential election. Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, recently assured voters that “election infrastructure has never been more secure.” Yet, U.S. officials have flagged two fake videos circulating online and publicly identified by the FBI as part of a Russia-backed malign influence campaign aimed at sowing doubt about election security.What are the implications of increasing attempts by foreign malign actors attempting to influence our elections? Are we effectively countering these attempts at influencing or undermining our electoral system? And perhaps most importantly, is the CISA's message of a secure election reaching the American people?Check out the answers to these questions and more in this episode of Fault Lines.Check out the sources that helped shape our expert's discussion!https://www.cbsnews.com/amp/news/2-more-russian-disinformation-videos-targeting-u-s-election-circulating-online/ https://thehill.com/homenews/campaign/4967613-fbi-condemns-fake-election-security-videos/amp/ https://apnews.com/article/fbi-russia-georgia-fraud-disinformation-eebea4ab200682ccd3e97fb9f164e6ca https://www.bloomberg.com/news/articles/2024-11-01/the-us-cyber-chief-trying-to-get-americans-to-trust-the-election?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTczMDY3NTAzNSwiZXhwIjoxNzMxMjc5ODM1LCJhcnRpY2xlSWQiOiJTTTlOU1FEV1JHRzAwMCIsImJjb25uZWN0SWQiOiI1NjZENkIwRkY1NzQ0Qjk4QjI4QTM2QjkyOTg5QjgyRSJ9.8lvkesmpjuUKfsm5kmjL4I0a9yXcLMA--MSSK1PNU2Q https://www.bloomberg.com/news/features/2024-11-01/us-election-security-officials-brace-to-protect-ballots-peopleFollow our experts on Twitter: @lestermunson@marthamillerdc@NotTVJessJonesLike what we're doing here? Be sure to rate, review, and subscribe. And don't forget to follow @masonnatsec on Twitter!We are also on YouTube, and watch today's episode here: https://youtu.be/4yBl8CA7xik Hosted on Acast. See acast.com/privacy for more information.
In this weekend's episode, three segments from this past week's Washington Journal. First, a discussion about federal efforts to protect the 2024 Election with Jen Easterly, Director of the Cybersecurity & Infrastructure Security Agency. Then two very different perspectives on Campaign 2024: Conservative attorney and vocal Trump critic George Conway – and a Trump supporter - former Trump Press Secretary and talk show host Sean Spicer Learn more about your ad choices. Visit megaphone.fm/adchoices
From disinformation to hacking and leaking, America's adversaries have never been this busy before an election. U.S. intelligence officials have detailed Russian disinformation, Iranian hacking and leaking efforts and a Chinese focus on congressional candidates critical of Beijing. Nick Schifrin discussed more with Jen Easterly of the Cybersecurity and Infrastructure Security Agency. PBS News is supported by - https://www.pbs.org/newshour/about/funders
From disinformation to hacking and leaking, America's adversaries have never been this busy before an election. U.S. intelligence officials have detailed Russian disinformation, Iranian hacking and leaking efforts and a Chinese focus on congressional candidates critical of Beijing. Nick Schifrin discussed more with Jen Easterly of the Cybersecurity and Infrastructure Security Agency. PBS News is supported by - https://www.pbs.org/newshour/about/funders
From disinformation to hacking and leaking, America's adversaries have never been this busy before an election. U.S. intelligence officials have detailed Russian disinformation, Iranian hacking and leaking efforts and a Chinese focus on congressional candidates critical of Beijing. Nick Schifrin discussed more with Jen Easterly of the Cybersecurity and Infrastructure Security Agency. PBS News is supported by - https://www.pbs.org/newshour/about/funders
Video Episode: https://youtu.be/FPiwoFbhV7Y In today’s episode, we delve into recent cybersecurity developments recommended by the NSA for iPhone and Android users, emphasizing the significance of weekly device reboots to mitigate malware threats in 2024. We also explore the U.S. Cybersecurity and Infrastructure Security Agency’s new security proposals aimed at protecting sensitive data from hostile entities, along with the potential risks of hardcoded AWS and Azure credentials in popular mobile applications. Finally, we discuss the exploitation of a critical Microsoft SharePoint vulnerability (CVE-2024-38094) that could enable remote code execution, revealing the importance of prompt patching and security diligence. Sources: 1. https://www.forbes.com/sites/daveywinder/2024/10/23/nsa-tells-iphone-and-android-users-reboot-your-device-now/ 2. https://www.bleepingcomputer.com/news/google/google-to-let-businesses-create-curated-chrome-web-stores-for-extensions/ 3. https://www.bleepingcomputer.com/news/security/aws-azure-auth-keys-found-in-android-and-ios-apps-used-by-millions/ 4. https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-of.html Timestamps 00:00 – Introduction 01:01 – Reboot your phone 02:49 – Google Enterprise Store 04:02 – Hardcoded Credentials 05:09 – Sharepoint Vulnerability 1. What are today’s top cybersecurity news stories? 2. Why did the NSA advise smartphone users to reboot their devices? 3. What is the cybersecurity significance of the NSA’s reboot recommendation? 4. How are AWS and Azure credentials being exposed in mobile apps? 5. What recent vulnerabilities have been identified in Microsoft SharePoint? 6. How can regular device rebooting enhance smartphone security? 7. What are the new security proposals from CISA for sensitive data? 8. What is the latest news about Google’s Enterprise Web Store for Chrome extensions? 9. Why is turning off and on your smartphone recommended by security experts? 10. How does the exposure of hardcoded credentials in apps affect user security? NSA, iPhone, Android, malware, Enterprise Web Store, Chrome extensions, productivity, AI tools, cloud service, credentials, Symantec, vulnerabilities, CVE-2024-38094, Microsoft SharePoint, hackers, remote code execution,
More than 600 frozen waffle products from over a dozen brands have been recalled following routine testing that detected listeria. Dr. Celine Gounder, CBS News medical contributor and editor at large for public health at KFF Health News, discusses the potential health risks.A recent CBS News poll found that more than 80% of voters think foreign governments are trying to influence the 2024 election. Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency, or CISA, talks with "CBS Mornings" about protecting the electoral process.CBS News' Ed O'Keefe speaks with Arizona voters about immigration, just two weeks ahead of the election. Polling shows a close race between Donald Trump and Kamala Harris, with few undecided voters on this key issue.As Robert Roberson's execution is halted by the Texas Supreme Court, John Grisham and Jim McCloskey advocate for ending the death penalty. Their new book, "Framed," highlights 23 cases of wrongful convictions, shedding light on flaws in the justice system.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Vice President Kamala Harris and former President Trump are on the campaign trail with just 15 days until Election Day. Election law expert Nate Persily weighs in on the legal questions surround Elon Musk's $1 million giveaway. Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, explains how foreign actors are seeking to influence the U.S. elections.
China's dominance of global supply chains for many goods, including clean energy technology, is increasing concerns about resilience, security, and geopolitical influence in today's new era of great power competition. At the same time, efforts to curb China's dominance are raising concerns about the cost of clean energy at a time when its rapid deployment is needed. So are we in a new Cold War with China? Should American policymakers try to decouple from China? And how should policymakers address China's supply chain dominance of the materials needed for the energy transition? This week, host Jason Bordoff talks with Dmitri Alperovitch about his new book “World on the Brink: How America Can Beat China in the Race for the 21st Century.” They discuss what the strategic challenges from China mean for American policymakers, how the U.S. can diversify critical supply chains away from China, and the security of America's energy infrastructure. Dmitri is the co-founder and chairman of Silverado Policy Accelerator. He is a co-founder and former CTO of CrowdStrike. Dmitri previously served as special advisor to the Department of Defense and currently serves on the Department of Homeland Security Advisory Council and the Cybersecurity and Infrastructure Security Agency's Cyber Safety Review Board.