The Department of Energy unveiled a $30 million funding opportunity for research, development and demonstration projects that can produce cybersecurity tools to defend clean energy delivery infrastructure against online threats. DOE said
MoreNew guidance has been issued by the Cybersecurity and Infrastructure Security Agency, the Environmental Protection Agency and the FBI to help water and wastewater systems — dubbed WWS — sector owners and
MoreThe National Institute of Standards and Technology revised a special publication designed to guide organizations in the measurement of their cybersecurity infrastructure’s effectiveness. NIST on Wednesday launched a solicitation for public comment
More by Jamie Bennet
The Cybersecurity and Infrastructure Security Agency and the FBI have released guidance warning organizations of potential cybersecurity threats posed by Chinese-manufactured unmanned aircraft systems. CISA said Wednesday China has enacted laws to
More by Naomi Cooper
A joint advisory from the Cybersecurity and Infrastructure Security Agency and FBI is warning organizations against the spread of a Python-scripted malware known as AndroxGh0st. In a document released Tuesday, the two
More by Jamie Bennet
The Office of the Department of Defense’s Chief Information Officer has released a document establishing the DOD Cyber Assessment Program and outlining the policy and responsibilities for program requirements and subprograms for
More by Jane Edwards
The design and security of information technology systems should take into greater account what end users need, what motivates them, how they behave and what their abilities are, according to a new
MoreThe Rapid Architecture Prototyping and Integration Development Laboratory, a part of the Space Vehicles Directorate within the Air Force Research Laboratory, is seeking input from industry about technology approaches that can be
MoreThe Department of Homeland Security’s Science and Technology Directorate is soliciting technology proposals designed to generate synthetic data that replicates authentic data patterns while maintaining the privacy and security of information. DHS
More by Naomi Cooper
A new RAND Corp. report highlights the need for the defense industrial base to take a comprehensive approach when it comes to addressing cybersecurity and supply chain risk management and look at
More by Jane Edwards