The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and the FBI have released an advisory saying they have observed more than 400 cyberattacks against U.S. and international organizations using
MoreMicrosoft has announced a detailed series of actions the company will be taking in response to the recent Biden Administration initiatives for implementing security tools and best practices to bolster national cybersecurity.
MoreThe National Institute of Standards and Technology (NIST) has published the draft of its cybersecurity guide aimed at presenting standards, strategies and technologies that can help in securing distributed energy resources and
MoreThe Information Technology Industry Council (ITI) advises the Office of Management and Budget (OMB) to help agencies identify priorities when implementing a zero-trust architecture (ZTA). ITI said Tuesday that it made a
MoreThe Cybersecurity and Infrastructure Security Agency (CISA) has announced the publication of two new resources to help mitigate threats facing the information and communications technology supply chain. The ICT SCRM Task Force
MoreThe Department of the Treasury has initiated several measures to fight ransomware and one of those is the announcement of the first sanctions designation against virtual currency exchange SUEX for its role
MoreThe Savannah River National Laboratory (SRNL) has opened a facility in Augusta, Georgia, to host research on protecting critical infrastructure and industrial control systems from cyber threats. SRNL said Friday that it
MoreThe Department of Commerce (DOC) has requested comments on its report on the risks in the supply chains for the information and communications technology (ICT) industrial base, with a deadline on Nov.
MoreU.S. Army Europe and Africa has activated the 2nd Multi-Domain Task Force, a group tasked to stop adversary anti-access/area-denial networks in land, air, water, space and other environments. The 2nd MDTF will
MoreProfessor Binoy Ravindran leads a U.S. Navy-supported team of students studying how to address cyber vulnerabilities in ways that do not interfere with a system's functions. The team from Virginia Tech is
More