The Cybersecurity and Infrastructure Security Agency has released Version 1.0 of Secure Configuration Baselines for Microsoft 365, providing policy configuration recommendations that align with CISA’s requirements and risk tolerance levels while still
MorePosing a compelling technical problem and providing access to state-of-the-art tools to solve it can help motivate researchers to participate in the Defense Advanced Research Projects Agency’s work on artificial intelligence, according
MoreThe Cybersecurity and Infrastructure Security Agency is seeking information from entities from the software industry regarding its Secure by Design principle campaign. The agency on Wednesday released its white paper on the
MoreThe Cybersecurity and Infrastructure Security Agency and the FBI have issued a joint advisory to inform organizations of tactics, techniques and procedures and indicators of compromise associated with the ransomware-as-a-service called ALPHV
MoreArtificial intelligence, online threats from China and the use of quantum computing for malicious activity were among the highlights of this year’s National Security Agency Cybersecurity Year in Review. The report released
MoreMichael Duffy, associate director at the Cybersecurity and Infrastructure Security Agency’s cybersecurity division, said CISA will launch a strategic effort in 2024 to modernize its approach to sharing enterprise threat information. In
MoreThe Cybersecurity and Infrastructure Security Agency has issued an advisory to guide public health organizations and other healthcare entities in building a resilient IT defense infrastructure. CISA announced Friday that the cybersecurity
MoreThe Department of Defense has launched the Chief Digital and Artificial Intelligence Office Continuous Bounty, a new hackathon-esque challenge meant to strengthen cybersecurity resilience that marks the first of its magnitude in
MoreThe National Security Agency has released recommendations and best practices for utilizing software bills of materials, or SBOM, to mitigate risks associated with the U.S. software supply chain. The new document suggests
MoreThe National Institute of Standards and Technology’s cybersecurity center is requesting public feedback on two draft guidelines for identifying, preventing and recovering from confidential data breaches. NIST announced that its National Cybersecurity
More