The watchdog made several recommendations in an audit of the Cybersecurity Maturity Model Certification effort. The Defense Department needs to improve communication with industry and develop...
The update will include a focus on supply chains for both hardware and software. The National Institute of Standards and Technology is preparing to again update...
Fujitsu says the attackers behind the May data breach used a vulnerability in the company’s ProjectWEB information-sharing tool to steal accounts from legitimate users and access...
The bill still includes what the House Armed Services Committee referred to as the widest empowerment of CISA since SolarWinds. The National Defense Authorization Act for...
Taking a proactive approach is a critical step in improving the way the government combats threats. One in three cyber incidents strike the public sector and...
The US Transportation Security Administration (TSA) has ordered operators of critical rail infrastructure to report cybersecurity incidents to the Cybersecurity and Infrastructure Security Agency (CISA) within 24 hours....
The new Federal Information Security Modernization Act guidance also prioritizes security testing and doubles down on CISA’s Continuous Diagnostics and Mitigation program. The Office of Management...
Enduring Security Framework (ESF) experts from the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) published their third installment of guidance to protect the confidentiality,...
Different cloud environments have different security needs. Here’s how to create a cloud-security scaffolding to strengthen protections while reducing manual support. On-prem data centers, public cloud...
The document is the third in a four-part series of guidance that categorizes security responsibilities according to their relevance for the cloud service providers, mobile operators...