The Government Accountability Office has warned that agencies may be vulnerable to foreign adversaries seeking to steal proprietary data. In a new report published Wednesday, the congressional watchdog looked at the implementation
MoreThe Cybersecurity and Infrastructure Security Agency has released new guidance aimed at helping critical infrastructure organizations and state, local, tribal and territorial governments address insider threats. As CISA continues to publish guidance
MoreThe Cybersecurity and Infrastructure Security Agency has released a new resource to guide the development of post-quantum cryptography, or PQC, adoption strategies across government and industry. The Product Categories for Technologies That
MoreSens. Gary Peters, D-Mich., and Mike Rounds, R-S.D., have proposed a bill that would require the Department of War to develop a cybersecurity workforce strategy. As lawmakers push for a more coordinated
MoreThe Cybersecurity and Infrastructure Security Agency, in collaboration with UK’s National Cyber Security Centre, or NCSC-UK, the FBI and international partners, has released Secure Connectivity Principles for Operational Technology. As cyber threats intensify
MoreThe National Security Agency has issued two new Zero Trust Implementation Guidelines, or ZIGs, to provide organizations with steps and actionable recommendations for the adoption of the cybersecurity framework. The documents, titled
MorePresident Donald Trump has renominated Sean Plankey, former director for cyber policy at the National Security Council, to serve as director of the Cybersecurity and Infrastructure Security Agency. With Plankey’s renomination to
MoreThe Cybersecurity and Infrastructure Security Agency has retired 10 emergency directives issued over a five-year period, signaling that the immediate risks the directives were designed to address have been mitigated. The Potomac
MoreThe National Institute of Standards and Technology is seeking industry input on practices and methodologies for assessing the secure development and deployment of artificial intelligence agents. In a request for information posted
MoreThe Department of War has issued new guidance expanding approved login options beyond the Common Access Card, allowing alternative authentication methods when CAC use is impractical or infeasible, Federal News Network reported
More