The National Security Agency, in partnership with the Cybersecurity and Infrastructure Security Agency, has released a list of its top 10 mitigation strategies that organizations should take to enhance the security of their cloud
MoreThe National Security Agency has continued its series of cybersecurity information sheets, or CSIs, on zero trust maturity to elaborate on strengthening internal network defense. The newest CSI focuses on the use
More by Jamie Bennet
The National Security Agency and partners from the U.S., Canada, Australia, the U.K. and New Zealand have released a joint cybersecurity advisory outlining the tactics, techniques and procedures used by Russian foreign
More by Naomi Cooper
Rob Joyce, director of cybersecurity at the National Security Agency and a two-time Wash100 awardee, will retire from NSA after 34 years of service. He will step down as head of the
More by Jane Edwards
The Department of Defense’s Chief Information Officer has released new guidance for sharing standards, best practices and training to international partners looking to develop their cybersecurity programs; cyber workforce; command, control and
More by Naomi Cooper
A cyberthreat group called Volt Typhoon is being sponsored by the Chinese government to disrupt critical infrastructure sectors such as communications, utilities, energy and transportation in the continental and non-continental U.S., according
More by Jamie Bennet
According to Paul Nakasone, outgoing commander of the U.S. Cyber Command and director of the National Security Agency, cyber threats from China are different from those the U.S. has previously dealt with. In remarks to
MoreJen Easterly, director of the Cybersecurity and Infrastructure Security Agency and a 2024 Wash100 awardee, said CISA has initiated actions to protect U.S. critical infrastructure from cyberthreats posed by China, including its
More by Jane Edwards
The Cybersecurity and Infrastructure Security Agency has worked with Australia’s cybersecurity agency to develop a document meant to guide organizations on how to use artificial intelligence systems securely. The guidance provides an
More by Jane Edwards
The National Security Agency has released recommendations and best practices for utilizing software bills of materials, or SBOM, to mitigate risks associated with the U.S. software supply chain. The new document suggests
More by Naomi Cooper