The National Security Agency has added a page to its cybersecurity site on GitHub that lists detection signatures and analytics for internet-accessible operational technology assets. The repository, dubbed ELITEWOLF, aims to help
MoreThe Federal Bureau of Investigation and Cybersecurity and Infrastructure Security Agency together issued an update regarding compromise indicators and detection methods for the AvosLocker ransomware. Issued on Wednesday, the joint Cybersecurity Advisory includes a YARA
More by Jamie Bennet
Several agencies, including the Cybersecurity and Infrastructure Security Agency, collaborated to publish a new set of recommendations for the use of open source software, or OSS, in critical infrastructure facilities and operational
More by Jamie Bennet
Christopher Barnhurst, deputy director of the Defense Information Systems Agency, said DISA should be prepared to deliver information to warfighters worldwide in the event of a conflict and amid cyberattacks by implementing
More by Jane Edwards
The Cybersecurity and Infrastructure Security Agency within the Department of Homeland Security plans to release in December a request for proposals for a recompete contract to provide support services for the Joint
More by Jane Edwards
A joint advisory released by the National Security Agency and Cybersecurity and Infrastructure Security Agency listed 10 of the most common misconfigurations in enterprise IT defense and how to mitigate risks arising
More by Jamie Bennet
The Program Executive Office Intelligence, Electronic, Warfare and Sensors is building up the U.S. Army’s cyber capabilities with the addition of Project Manager Defensive Cyber Operations. With the transition, PEO IEW&S is
More by Jane Edwards
A report led by the National Security Agency and the Cybersecurity and Infrastructure Security Agency suggested that multifactor authentication, or MFA, in organizations must have clearer definitions and security properties in order
More by Jamie Bennet
James Shappell, director of the DOD Insider Threat Management and Analysis Center at the Defense Counterintelligence and Security Agency, discussed at a recent symposium how DITMAC works to mitigate and prevent insider
More by Jane Edwards
Data-centric cybersecurity and automated classification can help the U.S. military achieve battlespace dominance due to their ability to protect information regardless of its location or users, Shannon Vaughn, general manager of Virtru
More by Jamie Bennet