A new Cybersecurity and Infrastructure Security Agency pilot program is now offering critical infrastructure entities access to government-owned cybersecurity shared services, according to Eric Goldstein, the agency’s executive assistant director for cybersecurity. In a
MoreThe Cybersecurity and Infrastructure Security Agency released a supplementary document to the Healthcare and Public Health, or HPH, Cyber Risk Summary it published in July. The new HPH risk mitigation guide discusses
MoreThe National Institute of Standards and Technology has issued two new special publications designed to help decision makers incorporate information and communication technology, or ICT, risks into the enterprise risk management programs
MoreThe Cybersecurity and Infrastructure Security Agency is seeking public input regarding the draft version of the Secure Software Development Attestation Form. CISA said Thursday that the form will be used by federal
MoreThe National Institute of Standards and Technology’s National Cybersecurity Center of Excellence has released the initial public draft of an internal report on data classification concepts and considerations for improving data collection.
MoreThe Cybersecurity and Infrastructure Security Agency, the FBI and the Multi-State Information Sharing and Analysis Center have warned against a ransomware threat group targeting organizations from the government and private sectors. In
MoreThe Cybersecurity and Infrastructure Security Agency has released the latest version of its Secure Tomorrow Series Toolkit, a set of interactive products to identify and mitigate emerging risks in the critical infrastructure,
MoreThe National Institute of Standards and Technology is seeking public feedback on its draft update of a special publication on protecting controlled unclassified information, or CUI. NIST on Thursday published its proposed
MoreThe National Security Agency and the Cybersecurity and Infrastructure Security Agency led the publication of guidelines to help players in the software supply chain manage their bill of materials. The new cybersecurity
MoreThe Cybersecurity and Infrastructure Security Agency worked with software and other IT experts to formulate a guide to help organizations decide when to issue a vulnerability exploitability exchange — a.k.a. VEX —
More