A bipartisan legislation is seeking updates to the Federal Acquisition Regulation to require federal contractors to implement vulnerability disclosure policies. U.S. Sen. Mark Warner, D-Va., vice chairman of the Senate Select Committee
MoreThe Department of the Air Force Chief Information Officer has published a paper explaining the ‘cyber cake‘ concept to provide a structured, transparent framework to achieve a stronger cybersecurity posture. FIPS Strategy
MoreThe cybersecurity and intelligence agencies of the U.S., Australia, New Zealand and the United Kingdom have released a joint cybersecurity information sheet urging public and private sector organizations using artificial intelligence systems
MoreA joint cybersecurity advisory from the United States and allied countries revealed that the Russian General Staff Main Intelligence Directorate 85th Main Special Service Center, also known as APT28, Fancy Bear and
MoreThe Cybersecurity and Infrastructure Security Agency and the FBI have unveiled a joint cybersecurity advisory highlighting the serious threat posed by LummaC2 information stealer, or infostealer, malware. LummaC2 Malware Advisory CISA said Wednesday
MoreMatt Hartman, the deputy executive assistant director for cybersecurity at the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, will step down on May 31, ending his nearly two decades of
MoreThe National Institute of Standards and Technology has published a white paper that establishes a metric for determining if a product vulnerability has been exploited. The NIST Cybersecurity White Paper, or CWSP,
MoreGarfield Jones, associate chief of strategic technology at the Cybersecurity and Infrastructure Security Agency, said CISA and other agencies hosted a call with over 600 federal IT officials to advance the adoption
MoreThe National Institute of Standards and Technology’s Cybersecurity for the Internet of Things program has published two internal reports, or IR, outlining recommended cyber activities for IoT device manufacturers. Both IR 8572
MoreFederal agencies will need to find the balance between risks and user experience when developing and implementing digital identity systems, according to Ryan Galluzzo, digital identity lead for the Applied Cybersecurity Division
More