Cyber Security
Cyber incident reports will be shared with the agency under the soon-to-be implemented requirements of the Cyber Incident Reporting for Critical Infrastructure Act. Cyber...
Hi, what are you looking for?
Cyber incident reports will be shared with the agency under the soon-to-be implemented requirements of the Cyber Incident Reporting for Critical Infrastructure Act. Cyber...
Lawmakers raised concerns that sensitive data could leak to adversaries through foreign-owned consumer technology. A coalition of Senators spanning both sides of the aisle...
The new pilot program will enable “timely risk reduction” by alerting critical infrastructure owners and operators of vulnerabilities within their systems that are susceptible...
As Russia’s full-scale war in Ukraine reaches its one-year anniversary, CISA has warned that the U.S. and European nations “may experience disruptive and defacement...
The request will help the agency develop the platform to address current challenges related to cyber threat intelligence. The General Services Administration filed a request...
The guide provides recommendations throughout the product lifecycle, from procurement to deployment. Several agencies published the last part in a series about securing the software supply...
Despite “a handful” of DDoS attacks targeting state and local election websites and some technical glitches affecting voting equipment, CISA says it saw “no...
Inaugural CISA director Chris Krebs expressed concern about the spread of election misinformation as Twitter changes up its user verification process. Republican lawmakers need...
A new set of documents and resources from the agency is designed to help critical infrastructure operators manage the basics of cybersecurity. The Cybersecurity...
Initial baselines address Microsoft services, and baselines for configuring rival services from Google are up next. The Cybersecurity and Infrastructure Security Agency is inviting...
Recent Comments