The Office of the National Cyber Director has released the summary report on the request for information it had issued in 2023 to call for recommendations on the areas that need to
MoreThe Federal Risk and Authorization Management Program has begun seeking public comments on a draft policy update that seeks to strengthen the use of cryptography to ensure the security of federal cloud
MoreThe Cybersecurity and Infrastructure Security Agency‘s Continuous Diagnostics and Mitigation program has historically focused on monitoring network cyber threats but is now turning its attention to cloud computing services, although according to
MoreThe General Services Administration Office of Inspector General recently conducted an audit of the agency’s robotic process automation program and has found issues with its security. In its Aug. 6 audit report,
MoreThe Cybersecurity and Infrastructure Security Agency and the FBI have issued an update on the indicators of compromise and tactics, techniques and procedures linked to Royal ransomware in a previous joint CISA-FBI
MoreThe National Institute of Standards and Technology‘s National Cybersecurity Center of Excellence has released the fourth draft of “NIST Special Publication 1800-35, Implementing a Zero Trust Architecture” and is calling for public
MoreThe Cybersecurity and Infrastructure Security Agency and the FBI have issued a guide to help customers ensure that the secure by design concept is a core manufacturing consideration in the software they
MoreThe director of the National Security Agency said at a recent dinner event with the Intelligence and National Security Alliance that his agency now possesses an artificial intelligence-powered autonomous penetration testing tool
MoreThe Government Accountability Office has called on the Environmental Protection Agency to develop a national strategy to address the cybersecurity threats against U.S. water and wastewater systems. In a report published on
MoreThe Cybersecurity and Infrastructure Security Agency has provided government acquisition and procurement organizations with a newly developed guidebook on mitigating cyberattack threats on the software they use in the supply chain. Titled
More