The National Security Agency has released a new cybersecurity information sheet, or CSI, on advancing organizations’ zero trust framework by focusing on visibility and analytics. According to the CSI, the zero trust
MoreJen Easterly, director of the Cybersecurity and Infrastructure Security Agency and a 2024 Wash100 Award recipient, has shared that CISA will develop a national plan that will guide federal initiatives to protect
MoreDavid Mussington, executive assistant director for infrastructure security at the Cybersecurity and Infrastructure Security Agency, said CISA is developing “physical security performance goals” amid increasing threats to critical infrastructure, Federal News Network
MoreWhite House National Cyber Director Harry Coker said he expects more than 50 percent of all advertised federal internet protocol space will advance use of secure routing agreements by the end of
MoreThe National Security Agency has issued a cybersecurity information sheet outlining recommendations for reaching progressive levels of workload and application capabilities under the zero trust framework. The document titled Advancing Zero Trust
MoreThe U.S. Cyber Command and the Defense Advanced Research Projects Agency have signed a binding agreement to create an expedited pathway to advance research and development of cyber technologies for military applications.
MoreThe Department of Defense has released a playbook designed to provide information on key DOD priorities for applying cybersecurity reciprocity in the department’s systems. The Cybersecurity Reciprocity Playbook includes a definition of
MoreThe Cybersecurity and Infrastructure Security Agency has released a new document that helps federal civilian agencies encrypt their Domain Name System traffic. The Encrypted Domain Name System Implementation Guidance offers a variety
MoreThe Cybersecurity and Infrastructure Security Agency and its partners have issued a document that seeks to guide civil society organizations in protecting themselves against cybersecurity threats, especially those posed by state-sponsored actors.
MoreThe National Institute of Standards and Technology has updated its guidance on protecting sensitive government data stored in systems operated by nonfederal organizations and its guidelines for assessing security requirements for controlled
More