Cynthia Brumfield

Cynthia Brumfield is a veteran communications and technology analyst who is currently focused on cybersecurity. She runs a cybersecurity news destination site, Metacurity.com.

Presidential campaigns taking email security more seriously--not so much at the local level

Recent False Claims Act cases a caution to gov’t contractors that skimp on security

Recent False Claims Act cases a caution to gov’t contractors that skimp on security

Two FCA cases unsealed in 2019 show that contractors can face multi-million-dollar penalties if they don't comply with federal government cybersecurity requirements.

On the 2020 Congressional cybersecurity agenda: Critical infrastructure, copyright exemptions

On the 2020 Congressional cybersecurity agenda: Critical infrastructure, copyright exemptions

Despite the distraction of an election year, Congress is expected to give the Department of Homeland Security tools to identify critical infrastructure threats and copyright exemptions to security researchers.

US elections remain vulnerable to attacks, despite security improvements

US elections remain vulnerable to attacks, despite security improvements

Continued Russian interference, insecure paperless voting processes will sow doubt about the next election despite some security improvements.

2020 outlook for cybersecurity legislation

2020 outlook for cybersecurity legislation

Here's a rundown of all the security-related bills working their way through this year's U.S. Congress, plus some hot security topics likely to be debated.

High-profile departures widen federal government’s security talent shortage

High-profile departures widen federal government’s security talent shortage

Recent key departures--voluntary and forced--might make it harder for government agencies to find the talent needed to fulfill their security missions.

The race for quantum-proof cryptography

The race for quantum-proof cryptography

Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research.

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

Politicizing cybersecurity only serves to undermine trust in its practices and objectivity, experts fear.

Global threat groups pose new political and economic dangers

Global threat groups pose new political and economic dangers

Nation-state players in Iran, North Korea, Saudi Arabia and Russia are getting new objectives and changing strategies, say experts.

Russia’s Sandworm hacking group heralds new era of cyber warfare

Russia’s Sandworm hacking group heralds new era of cyber warfare

In-depth research on Sandworm shows broad capabilities and scope to disrupt anything from critical infrastructure to political campaigns in any part of the world.

Twitter spy scandal a wake-up call for companies to clean up their data access acts

Twitter spy scandal a wake-up call for companies to clean up their data access acts

Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies.

US Department of Justice push for encryption backdoors might run afoul of First Amendment

US Department of Justice push for encryption backdoors might run afoul of First Amendment

Is encryption code speech? Earlier court rulings suggest that it is, legally, and therefore subject to First Amendment protections.

Load More