The National Institute of Standards and Technology is seeking public feedback on its draft update of a special publication on protecting controlled unclassified information, or CUI. NIST on Thursday published its proposed
MoreThe National Security Agency and the Cybersecurity and Infrastructure Security Agency led the publication of guidelines to help players in the software supply chain manage their bill of materials. The new cybersecurity
MoreThe Cybersecurity and Infrastructure Security Agency worked with software and other IT experts to formulate a guide to help organizations decide when to issue a vulnerability exploitability exchange — a.k.a. VEX —
MoreKemba Walden, acting national cyber director, has commended the commitments made by technology companies, defense manufacturers, financial institutions, non-profits and other organizations to build the U.S. cyber workforce in support of the
MoreHomegrown individual or small extremist cells that exploit online violence are the biggest terrorism threat to the United States, FBI Director Christopher Wray said during a Senate hearing. In a statement presented
MoreThe Cybersecurity and Infrastructure Security Agency has launched an updated version of an open source log management platform designed to help organizations detect and counter cyberthreats using available security data. The U.K.
MoreWork is being carried out to encourage state, local, tribal and territorial agencies to optimize their use of federal grants to acquire, implement or expand services and equipment that enable the Advanced
MoreThe Cybersecurity and Infrastructure Security Agency has led the remediation of more than 12 million known exploited vulnerabilities across 102 government departments in the past two years, said Eric Goldstein, CISA’s executive
MoreThe Cybersecurity and Infrastructure Security Agency worked with the Department of Health and Human Services to create a toolkit aimed at addressing online security gaps in public health and the healthcare sector
MoreThe Defense Advanced Research Projects Agency has begun accepting abstracts from vendors interested in participating in the Intrinsic Cognitive Security program. ICS is a two-phase, 36-month effort that aims prepare for potential
More