The Department of Justice has expressed concerns over how the FBI manages its electronic storage for media that may contain sensitive but unclassified—or SBU—information. Michael Horowitz, the inspector general of the DOJ,
MoreThe National Security Agency has released a cybersecurity information sheet outlining the best practices for event logging and threat detection in cloud services, enterprise networks, mobile devices and operational technology networks. The
MoreThe Department of Homeland Security‘s Science and Technology Directorate is prototyping a way to protect data that S&T Data Analytics Technology Center Director Alexandria Phounsavath describes as “a different way of thinking
MoreThe National Institute of Standards and Technology is seeking public comments on a draft version of its updated digital identity guidance. The draft Digital Identity Guidelines Special Publication 800-63 Revision 4 aims
MoreThe Federal Aviation Administration seeks to improve the cybersecurity of transport category airplanes, engines and propellers by making changes to Code of Federal Regulations Title 14 and has issued a notice of
MoreThe Office of the Director of National Intelligence, FBI and the Cybersecurity and Infrastructure Security Agency have released a joint statement informing the public of Iran’s efforts to influence the U.S. election
MoreThe Department of Homeland Security’s Science and Technology directorate is searching for commercial suppliers of software artifact dependency graph, or ADG, capabilities that lessen software risks to cyber and physical infrastructure. Each
MoreThe National Institute of Standards and Technology’s National Cybersecurity Center of Excellence has released two publications supporting its newly launched white paper series for applying 5G cybersecurity and privacy capabilities. The series
MoreThe Department of Defense has started soliciting comments on a proposed rule to implement the contractual requirements related to the second iteration of the Cybersecurity Maturity Model Certification program. According to a
MoreThe National Institute of Standards and Technology has released the first three finalized post-quantum cryptography standards and encryption algorithms designed to protect encrypted data from cyberattacks that could be carried out through
More