#securityclearance

[ follow ]
US news
fromMail Online
19 hours ago

Death of whistleblower set to reveal UFO secrets declared 'suspicious'

A former US Air Force intelligence officer's suspicious death raises calls for an FBI investigation into potential foul play regarding UFO testimony.
US politics
fromwww.theguardian.com
21 hours ago

FBI's Kash Patel denies excess drinking amid officials' US security concerns

Kash Patel denies heavy drinking allegations and threatens legal action against the Atlantic, while concerns about his leadership persist.
UK politics
fromwww.theguardian.com
1 day ago

What happens during security vetting and why did Peter Mandelson fail his?

Peter Mandelson was appointed as ambassador to the US despite failing the UK Security Vetting process.
#nist
Information security
fromComputerWeekly.com
1 day ago

Surging CVE disclosures force NIST to shake up workflows | Computer Weekly

NIST is changing its approach to handling CVEs, focusing on those with the greatest potential impact due to increased submissions.
Information security
fromTechzine Global
3 days ago

NIST updates NVD: not every CVE will be scrutinized

NIST is updating its vulnerability assessment methodology due to an overwhelming increase in CVEs, prioritizing critical vulnerabilities for analysis.
Information security
fromSecurityWeek
3 days ago

NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

NIST updates its National Vulnerability Database operations to prioritize enriching critical CVEs due to a surge in submissions.
Information security
fromComputerWeekly.com
1 day ago

Surging CVE disclosures force NIST to shake up workflows | Computer Weekly

NIST is changing its approach to handling CVEs, focusing on those with the greatest potential impact due to increased submissions.
Information security
fromTechzine Global
3 days ago

NIST updates NVD: not every CVE will be scrutinized

NIST is updating its vulnerability assessment methodology due to an overwhelming increase in CVEs, prioritizing critical vulnerabilities for analysis.
Information security
fromSecurityWeek
3 days ago

NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

NIST updates its National Vulnerability Database operations to prioritize enriching critical CVEs due to a surge in submissions.
#cisa
SF politics
fromNextgov.com
1 day ago

CISA resources 'more limited than I would like' amid shutdown, top official says

CISA faces significant funding limitations impacting its ability to counter hacking threats and conduct essential activities.
SF politics
fromNextgov.com
1 day ago

CISA resources 'more limited than I would like' amid shutdown, top official says

CISA faces significant funding limitations impacting its ability to counter hacking threats and conduct essential activities.
OMG science
fromMail Online
1 day ago

White House directs FBI to investigate missing scientists' cases

The White House is investigating the mysterious disappearances of scientists linked to sensitive projects, involving the FBI and a review of potential connections.
#surveillance
Privacy professionals
fromwww.aljazeera.com
1 day ago

US Congress extends controversial surveillance power under FISA for 10 days

The US Congress has temporarily extended a controversial surveillance law allowing intelligence agencies to collect foreign data, including interactions with US citizens.
Privacy professionals
fromWIRED
3 days ago

Congress Turns Up Pressure on DHS Over Palantir's Role in Immigration Crackdown

Members of Congress demand DHS and ICE disclose details on surveillance tools used in immigration enforcement.
Privacy professionals
fromwww.aljazeera.com
1 day ago

US Congress extends controversial surveillance power under FISA for 10 days

The US Congress has temporarily extended a controversial surveillance law allowing intelligence agencies to collect foreign data, including interactions with US citizens.
Privacy professionals
fromWIRED
3 days ago

Congress Turns Up Pressure on DHS Over Palantir's Role in Immigration Crackdown

Members of Congress demand DHS and ICE disclose details on surveillance tools used in immigration enforcement.
fromConde Nast Traveler
1 day ago

Global Entry vs. TSA PreCheck: Which Should You Get?

TSA PreCheck is a program that vets US travelers to give them access to an expedited screening lane at the airport security checkpoint. Members do not need to remove large electronics or liquids from their carry-on bags, and they can keep on light jackets and belts, too, saving precious time before a flight.
Travel
Privacy technologies
fromnews.bitcoin.com
2 days ago

Anthropic Adds ID Verification to Claude for Select AI Users

Anthropic implemented ID checks for Claude users in April 2026 to limit abuse and meet legal obligations, while not storing ID images on its systems.
Marketing tech
fromExchangewire
3 days ago

Shinka Achieves SOC 2 Type II Certification

Shinka achieved SOC 2 Type II certification, demonstrating its commitment to security and compliance as it scales globally.
#pentagon
Washington DC
fromNextgov.com
3 days ago

Pentagon announces senior appointments to CIO's office

Five officials appointed to the Pentagon's CIO office to enhance technology management and drive transformation.
Intellectual property law
fromComputerworld
1 week ago

US court refuses to stay Pentagon's 'supply-chain risk' blacklisting of Anthropic

The federal appeals court upheld the Pentagon's supply-chain risk designation against Anthropic, conflicting with a California court's earlier decision.
Washington DC
fromNextgov.com
3 days ago

Pentagon announces senior appointments to CIO's office

Five officials appointed to the Pentagon's CIO office to enhance technology management and drive transformation.
Intellectual property law
fromComputerworld
1 week ago

US court refuses to stay Pentagon's 'supply-chain risk' blacklisting of Anthropic

The federal appeals court upheld the Pentagon's supply-chain risk designation against Anthropic, conflicting with a California court's earlier decision.
#cybersecurity
Higher education
fromNextgov.com
4 days ago

CISA cancels CyberCorps summer internship hiring amid DHS shutdown

CISA reversed its decision to onboard summer interns due to a funding lapse in the Department of Homeland Security.
Information security
fromNextgov.com
3 days ago

Expect more cybersecurity executive orders soon, national cyber director says

President Trump is expected to sign more cybersecurity executive orders soon, following the release of the national cyber strategy.
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromSecuritymagazine
3 weeks ago

How to Grow Your Cybersecurity Skills, According to Experts

Cybersecurity leaders are innovating and evolving their careers through education, soft skills, networking, and unique paths for professional growth.
Higher education
fromNextgov.com
4 days ago

CISA cancels CyberCorps summer internship hiring amid DHS shutdown

CISA reversed its decision to onboard summer interns due to a funding lapse in the Department of Homeland Security.
Information security
fromNextgov.com
3 days ago

Expect more cybersecurity executive orders soon, national cyber director says

President Trump is expected to sign more cybersecurity executive orders soon, following the release of the national cyber strategy.
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromSecuritymagazine
3 weeks ago

How to Grow Your Cybersecurity Skills, According to Experts

Cybersecurity leaders are innovating and evolving their careers through education, soft skills, networking, and unique paths for professional growth.
Digital life
fromwww.dw.com
5 days ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
#ice
US politics
fromwww.theguardian.com
2 days ago

ICE's hiring spree led to influx of recruits with questionable qualifications, investigation shows

Rapid recruitment by ICE has resulted in hiring employees with questionable qualifications amid the Trump administration's mass deportation agenda.
US politics
fromwww.theguardian.com
2 days ago

ICE's hiring spree led to influx of recruits with questionable qualifications, investigation shows

Rapid recruitment by ICE has resulted in hiring employees with questionable qualifications amid the Trump administration's mass deportation agenda.
#fbi
SF politics
fromThe Atlantic
1 day ago

Kash Patel's Erratic Behavior Could Cost Him His Job

FBI Director Kash Patel panicked over a technical error, fearing he was fired, reflecting his concerns about job security amid administration changes.
Privacy professionals
fromTechRepublic
2 weeks ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromSecuritymagazine
1 week ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy technologies
fromThe Verge
3 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
US news
fromSecuritymagazine
1 week ago

Top Secret Clearance Holder Charged With Leaking Classified National Defense Information

Courtney Williams was arrested for allegedly sharing classified national defense information with unauthorized individuals, including a journalist, from 2022 to 2025.
US politics
fromwww.npr.org
2 days ago

House extends surveillance powers for 10 days

The House voted to extend a controversial surveillance program, FISA 702, until April 30 amid ongoing debates about privacy and national security.
#dhs
SF politics
fromNextgov.com
2 weeks ago

DHS drops investigation into former acting CISA chief's failed polygraph exam

DHS closed an investigation into CISA staff who arranged a polygraph for the former acting director, clearing them of wrongdoing.
SF politics
fromNextgov.com
2 weeks ago

DHS drops investigation into former acting CISA chief's failed polygraph exam

DHS closed an investigation into CISA staff who arranged a polygraph for the former acting director, clearing them of wrongdoing.
US politics
fromNextgov.com
2 days ago

Secret Service is embracing new solutions to combat malicious drones, director says

The U.S. Secret Service is adopting kinetic mitigation technologies to counter drone threats for upcoming large-scale events.
Podcast
fromSecuritymagazine
3 weeks ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
Remote teams
fromTheregister
2 weeks ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
SF politics
fromNextgov.com
2 weeks ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
Artificial intelligence
fromNextgov.com
2 weeks ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
US politics
fromArs Technica
2 weeks ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
Information security
fromComputerWeekly.com
3 days ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
Intellectual property law
fromEngadget
1 month ago

Defense Department says Anthropic poses 'unacceptable risk' to national security

The Pentagon filed a court response opposing Anthropic's lawsuit, arguing that the AI company's refusal to allow unrestricted military use poses unacceptable national security risks through potential technology manipulation or sabotage during warfighting operations.
Information security
fromSecurityWeek
4 days ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
#iam
Information security
fromComputerworld
4 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
4 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
4 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
4 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromTNW | Apps
3 days ago

OpenAI releases GPT-5.4-Cyber for vetted security teams, scaling Trusted Access programme

OpenAI is launching GPT-5.4-Cyber for cybersecurity, expanding its Trusted Access for Cyber program to thousands of verified defenders.
#executive-protection
Information security
fromSecuritymagazine
4 days ago

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

The executive protection model must evolve from a reactive approach to a comprehensive security infrastructure due to increased accessibility of personal information.
Information security
fromSecuritymagazine
2 weeks ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromSecuritymagazine
4 days ago

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

The executive protection model must evolve from a reactive approach to a comprehensive security infrastructure due to increased accessibility of personal information.
Information security
fromSecuritymagazine
2 weeks ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
fromwww.businessinsider.com
5 days ago

We're in a new era of heightened CEO safety measures, security pros say

This attack is just shedding light on the fact that you're even more vulnerable outside of the office, said Don Aviv, CEO of Interfor International, a security consultancy.
Information security
#ai
Information security
fromTechzine Global
5 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromNextgov.com
3 weeks ago

ODNI is building a framework to boost spy agencies' AI adoption

The Office of the Director of National Intelligence is enhancing AI adoption for cybersecurity within the intelligence community as part of a modernization effort.
fromSecuritymagazine
1 month ago

Trump's Former Counter-Terrorism Official Investigated Over Alleged Leaks

Joe Kent, President Trump's former top counter-terrorism official, is under investigation by the FBI's Criminal Division for allegedly improperly sharing classified information. The investigation began months before Kent's recent resignation, according to four individuals with direct knowledge of the probe who spoke to Semafor.
US politics
Information security
fromThe Hacker News
1 week ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Mental health
fromSecuritymagazine
1 month ago

Security Insights Delivered Through Podcasts

Security professionals face significant mental-health risks and team burnout, requiring leaders to integrate empathetic practices and psychological safety into security operations.
fromNextgov.com
2 months ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
#fbi-cybersecurity
fromSecurityWeek
1 month ago
Privacy professionals

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
fromTechRepublic
1 month ago
Privacy professionals

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
Privacy professionals
fromSecurityWeek
1 month ago

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
Privacy professionals
fromTechRepublic
1 month ago

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
Information security
fromReadWrite
3 weeks ago

The CISO Struggle: How AI is Changing the Data Security Landscape

Generative AI adoption is rapid, but security governance is lagging, creating significant risks for organizations.
US politics
fromTheregister
2 months ago

CISA insider-threat warning comes with an ironic twist

Insider threats are among the most serious security risks and require multidisciplinary teams and decisive action to detect, mitigate, and prevent damage.
US politics
fromNextgov.com
1 month ago

Bipartisan lawmakers worried about shaky progress on modernized government worker background check system

The National Background Investigation Services system for federal employee vetting faces a decade-long delay until fiscal 2028, costing $2.4 billion with $2.2 billion more needed, impacting national security and government contractors.
Information security
fromThe Hacker News
1 month ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
US politics
fromwww.mediaite.com
1 month ago

High Alert': DHS and FBI Monitoring Potential Threats on US Soil During Strikes on Iran

U.S. homeland security officials are coordinating enhanced monitoring and threat prevention measures following military action against Iran.
fromComputerworld
1 month ago

FBI wiretap system tapped by hackers

The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond.
Information security
Information security
fromNextgov.com
1 month ago

FBI is probing 'suspicious' breach into bureau networks

The FBI is investigating suspicious activities on its networks, potentially involving systems used for court-ordered wiretapping requests.
Information security
fromtechcrunch.com
1 month ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
fromSecuritymagazine
2 months ago

What Background Checks Miss: The Human Layer Behind Modern Screening

Over the past few years, while applying for security and risk-related roles, I noticed a pattern that surprised me: many background screening vendors only asked for a few years of employment history, minimal address information, minimal educational verification, and returned results within one or two days. In contrast, I also noticed that industries with higher regulatory standards, such as finance and transportation, conduct far deeper checks that can span from weeks to months.
Information security
fromDataBreaches.Net
1 month ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
Information security
fromThe Hacker News
1 month ago

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

CISA added four actively exploited high-severity vulnerabilities to its KEV catalog, including Chrome use-after-free, TeamT5 arbitrary upload, Zimbra SSRF, and Windows ActiveX RCE.
Information security
fromSecuritymagazine
1 month ago

Enhancing Incident Response with Integrated Access Control and Video Verification

Integrated access control and video verification technology enhance incident response capabilities and operational resilience by providing situational clarity and enabling faster security action.
[ Load more ]