The Federal Communications Commission will establish a voluntary cybersecurity labeling program for wireless consumer internet of things products to help consumers consider security standards when purchasing smart devices. The FCC said Thursday
MoreNearly all the respondents of a recent survey conducted by The Harris Poll on behalf of Mitre agreed that ensuring the security of critical infrastructure is key to national security and maintaining
MoreDavid McKeown, senior information security officer and deputy chief information officer for cybersecurity at the Department of Defense, is looking for potential applications of artificial intelligence in the cybersecurity domain in support
More by Naomi Cooper
The Department of Defense has issued a final rule that seeks to firm up revisions to the eligibility criteria for the Defense Industrial Base Cybersecurity Program as part of efforts to improve
More by Jane Edwards
The Cybersecurity and Infrastructure Security Agency’s Secure Cloud Business Applications project, a.k.a. SCuBA, has released new guidance to assist federal agencies in implementing cybersecurity capabilities as they migrate identity authentication from traditional
More by Naomi Cooper
Computer viruses created from artificial intelligence and the surge in commercial spyware were some of the highlights of this year’s threat assessment released by the Office of the Director of National Intelligence.
More by Jamie Bennet
The Cybersecurity and Infrastructure Security Agency and the Office of Management and Budget released a secure development attestation form for software companies. The form reinforces secure-by-design principles in software development as well
More by Jamie Bennet
The Cybersecurity and Infrastructure Security Agency announced new initiatives to help ensure the security of the open source ecosystem at a two-day Open Source Software Security Summit. CISA said Thursday that the actions
More by Jane Edwards
A report by the FBI’s Internet Crime Complaint Center, also known as IC3, has found that healthcare and public health, critical manufacturing and government facilities are the top three critical infrastructure sectors
More by Jane Edwards
The National Security Agency has continued its series of cybersecurity information sheets, or CSIs, on zero trust maturity to elaborate on strengthening internal network defense. The newest CSI focuses on the use
More by Jamie Bennet