The Cybersecurity and Infrastructure Security Agency has chosen three new topics for its Secure Tomorrow Series Toolkit, a set of interactive products to help critical infrastructure stakeholders identify and mitigate emerging risks.
MoreThe Defense Information Systems Agency has published security guidance for using the Crunchy Data PostgreSQL versions 13 to 16 within the Department of Defense to ensure information systems and software are protected
MoreThe Cybersecurity and Infrastructure Security Agency has published new guidance to support organizations’ efforts to address memory safety risks in open-source software, or OSS, projects. Titled “Exploring Memory Safety in Critical Open
MoreThe Cybersecurity and Infrastructure Security Agency on Thursday released a report offering recommendations for small and medium-sized businesses, or SMBs, to facilitate single sign-on, or SSO, adoption. The CISA report states that
MoreThe Department of Energy has issued a document outlining a set of principles regarding cybersecurity best practices for energy infrastructure supply chains. The document, titled Supply Chain Cybersecurity Principles, was developed in
MoreThe Cybersecurity and Infrastructure Security Agency is calling on business leaders to review a recently-released joint guidance titled Modern Approaches to Network Access Security, which is meant for organizations seeking to transition
MoreStrategic Systems Programs, the Navy command tasked with providing lifecycle support for the sea component of the U.S. nuclear triad, completed in May the Cyber Operational Readiness Assessment, or CORA, program, for
MoreThe Cybersecurity and Infrastructure Security Agency and the Election Assistance Commission, or EAC, released a guide to help state, local, tribal, and territorial election officials mitigate risk to election infrastructure and operations.
MoreArtificial intelligence experts from government agencies and industry partners participated in an inaugural AI tabletop exercise meant to promote effective and coordinated responses to AI cybersecurity incidents. The Cybersecurity and Infrastructure Security
MoreThe U.S. Army’s I Corps and its allied forces have demonstrated secure information sharing via a single architecture based on zero trust principles during a Yama Sakura 85 multilateral command post exercise,
More