The Department of the Treasury’s Federal Insurance Office and the National Science Foundation have partnered to form a new research center that will provide research, thought leadership and analysis support to help
MoreThe Department of Defense is requesting proposals from industry sources capable of providing a joint cyber hunt kit prototype designed to conduct hunt operations on defense networks. The Defense Innovation Unit said
MoreThe Cybersecurity and Infrastructure Security Agency completed 1,754 notifications to critical infrastructure organizations in calendar year 2023 through its Ransomware Vulnerability Warning Pilot program. Launched in March 2023, the RVWP program seeks
MoreMITRE has incorporated the Department of Defense’s Cybersecurity Maturity Model Certification into Cyber Resiliency Engineering Framework Navigator, a tool that works to help engineers in their decision-making process when designing cyber-resilient capabilities.
MoreThe National Institute of Standards and Technology has published a supplement to an existing NIST Special Publication to provide interim guidance for agencies that intend to use syncable authenticators in public-facing and
MoreThe Government Accountability Office has recommended that the federal government complete the implementation of the leadership and oversight requirements outlined in a 2021 executive order on protecting federal information technology systems from
MoreThe Department of Defense’s Cyber Crime Center, also known as DC3, and the Defense Counterintelligence and Security Agency have partnered to create a program that seeks to bring vulnerability disclosure capabilities to
MoreThe Cybersecurity and Infrastructure Security Agency and its U.S. and international partners have released a joint cybersecurity advisory, or CSA, warning organizations against the Akira ransomware that has targeted critical infrastructure entities
MoreA “robust response” to the upcoming release of the third revision of National Institute of Standards and Technology Special Publication 800-171 must feature three elements, according to Edward Tuorinsky, the founder of
MoreThe Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation and the Office of the Director of National Intelligence have released guidance concerning the tactics used by foreign threat actors when
More