The Department of Defense has launched the Chief Digital and Artificial Intelligence Office Continuous Bounty, a new hackathon-esque challenge meant to strengthen cybersecurity resilience that marks the first of its magnitude in
MoreThe National Institute of Standards and Technology has published recommendations on developing policies and procedures for reporting and managing vulnerability disclosures for federal government systems. The NIST Special Publication 800-216 outlines a
More by Naomi Cooper
The Federal Trade Commission urges companies to address the cyber vulnerabilities associated with the Log4j logging utility software, which records activities in consumer-facing systems. FTC said Tuesday that Log4j vulnerabilities, when exploited,
MoreThe Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency has issued a report about the potential risks posed by 5G mobile network adoption to U.S. supply chains, network security and trusted
More by Jane Edwards