The Cybersecurity and Infrastructure Security Agency has jointly developed with the FBI and the Australian Cyber Security Centre a guidance to help software manufacturers and service providers deliver secure products and maintain
MoreThe U.S. Army will build three Theater Information Advantage Detachments to strengthen efforts to combat adversaries in the information dimension, according to Lt. Gen. Maria Barrett, head of the Army Cyber Command.
MoreThe White House Office of Information and Regulatory Affairs is reviewing a proposed rule that would update the cybersecurity protections required under the Health Insurance Portability and Accountability Act, or HIPAA, Federal
MoreThe Department of the Navy’s Flank Speed cloud platform has attained full compliance with all Department of Defense zero trust expectations. In a second round of security assessments led by the DOD’s
MoreThe Department of Homeland Security’s Cyber Crimes Center, known as C3, has created four new international cyber investigations liaison roles as part of a push to strengthen its ability to address transnational cybercrime.
MoreThe Federal Communications Commission is expanding its partnership with state officials on matters of privacy, data protection and cybersecurity enforcement. The agency on Monday said its Privacy and Data Protection Task Force
MoreThe Department of Justice has proposed a rule to launch a program designed to address national security risks associated with attempts by countries of concern to obtain and exploit U.S. citizens’ personal
MoreThe Professional Services Council has responded to a Department of Defense request for comments regarding a proposed Cybersecurity Maturity Model Certification program rule. The proposed rule, titled “Assessing Contractor Implementation of Cybersecurity Requirements,” establishes standards
MoreThe FBI and the Cybersecurity and Infrastructure Security Agency have released the Product Security Bad Practices catalog for public comment. CISA said Wednesday the catalog details the risky practices that should be avoided by
MoreThe Cybersecurity and Infrastructure Security Agency has issued the third edition of its guidance aimed at promoting transparency in the supply chain of software components. The new document, titled “Transparency: Establishing a Common Software
More