NIST advisors debating the merits of OMB’s policy on software vendors’ “self-attestation” to secure development practices found common ground on a need for audits and testing....
The agency’s advisory committee typically meets behind closed doors, but they are required to hold at least one public meeting per year. Members of the public...
CISA officials often stress their non-regulatory role, but Congress keeps trying to give the agency regulatory responsibilities. The Cybersecurity and Infrastructure Security Agency’s promise to conceal...
Key members of the House and Senate are altering proposals for identifying systemically important critical infrastructure and securing the software supply chain. An important set of...
But big companies want to avoid agencies’ use of related performance goals in new regulation. The Cybersecurity and Infrastructure Security Agency will spend the next three...
Scality announced the results of an independent survey of IT decision makers across France, Germany, the UK, and the US about their data sovereignty strategies. 98%...
The agency is embarking on a rulemaking process to implement the law, which requires those who make ransomware payments to report them to the government. The...
CISA Director Jen Easterly said industry concerns shouldn’t preclude use of the commission’s regulatory authority to mitigate exploitation of the Border Gateway Protocol. The Federal Communications...
CYTRIO released findings from additional independent research it conducted during Q1 2022 on the state of companies’ readiness to comply with the California Consumer Privacy Act (CCPA), California Privacy...
But, in general, the industry wants NIST to avoid making any changes at all to the choose-your-own-adventure document that has guided risk management and U.S. cybersecurity...
Recent Comments