Cyber Security
The network guidance document is years in the making. The Cybersecurity and Infrastructure Security Agency on Thursday published guidance meant to provide federal agencies with security...
Hi, what are you looking for?
The network guidance document is years in the making. The Cybersecurity and Infrastructure Security Agency on Thursday published guidance meant to provide federal agencies with security...
Look for trainers working on the Cybersecurity Maturity Model Certification program to realign their efforts to support recent changes to the certification process in...
Forty-two advisers have been appointed or are in the process, with eight states still needing federal-level coordinators. The Cybersecurity and Infrastructure Security Agency is...
The United Kingdom, meanwhile, recently updated its approach, crediting strong regulatory measures with significant cyber-risk reduction over recent years. Despite starts and stops dating...
Key U.S. allies supported the effort but did not sign on to a joint statement committing to the creation of a code of conduct...
The SolarWinds cyberattack was unprecedented in both scope and scale. The sophisticated breach saw hackers bake their exploit into a trusted software update pushed...
Cyber policy lead Mieke Eoyang discussed the Defense Department’s role in the nation’s cybersecurity posture, including in defending elections and countering ransomware attacks. Those...
TMF is key to modernizing government operations in line with citizen expectations, according to Deputy Federal Chief Information Officer Maria Roat. At a personal...
Government entities are required by law to use such intrusion prevention capabilities. The Cybersecurity and Infrastructure Security Agency is preparing to deploy a Protective...
Agency leaders said they aim to improve coordination among the many agencies with cybersecurity missions. The need to strengthen cybersecurity in the United States...
Recent Comments