Allan Friedman, who just moved to the Cybersecurity and Infrastructure Security Agency (CISA) to help scale up work on software bill of materials (SBOM), said operationalizing SBOM requires integrating the concept into
MoreThe Government Accountability Office (GAO) plans to issue a report in fiscal year 2022 about the impact of technology adoption that is driven by mass telework on federal agencies’ cybersecurity posture. GAO
MoreThe FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have issued an advisory outlining mitigation measures that organizations in public and private sectors can implement to reduce the risk of ransomware
MoreThe Office of Management and Budget (OMB) has released a memorandum that establishes a maturity model for event log management as part of efforts to improve the federal government’s capabilities to remediate
MoreDeputy Attorney General Lisa Monaco has announced a new fellowship program at the Department of Justice meant to train and build a pool of attorneys and prosecutors that could handle cybersecurity cases.
MoreThe FBI has identified a group of cyberthreat actors that has launched ransomware attacks against U.S. companies since November using Cobalt Strike software. The OnePercent Group uses phishing emails with a malicious
MoreThe Department of Homeland Security is requesting public comments on an interim rule that seeks to establish a new system to help address challenges when it comes to hiring and retaining cybersecurity
MoreThe Federal Risk and Authorization Management Program (FedRAMP) office has updated materials that educate companies about the requirements for developing a cloud security package. The revision of FedRAMP's System Security Plan Required
MoreThe Cybersecurity and Infrastructure Security Agency (CISA) is exploring potential sources of support services for a national competition that aims to recognize the best cybersecurity professionals in the federal government. Specifically, CISA
MoreThe Cybersecurity and Infrastructure Security Agency has released a set of procedures organizations can follow when facing ransomware, a form of malware that blocks user access to a system until money is
More