CISA
-
DOE is Taking a Collaborative Approach to Secure the Electrical Grid
Partnerships and modern mitigation tools are key to securing critical infrastructure from cyberattacks.
7m read -
SBOMs Key for 'Confidence', 'Transparency' into Critical Software
The list is a priority for organizations working to prevent cyberattacks in a heightened threat environment.
7m read -
Cyber Leaders Heed Warning Against Cyber Attacks on American Critical Infrastructure
Cyber experts say Chinese hackers will likely target U.S. critical infrastructure as part of Taiwanese war plans.
7m read -
CISA Updates Zero Trust Maturity Model to Align with White House Directives
CISA's updated guidance provides more technical depth across the five pillars of zero trust and adds a new maturity stage.
7m read -
Federal CIO Encourages Government to 'Speed Up' Tech Adoption
Technology leaders across government gathered to discuss top IT modernization priorities during DOL’s Federal Tech Day, which included AI and cybersecurity.
7m read -
New Measures Put Cybersecurity Top of Mind in HHS Implementation Guide
The agency released a ‘roadmap’ to help organizations decrease and confront cyberattacks in health care.
7m read -
The 6 Core Principles Vital to Building a Robust Culture of Cyber Readiness
CISA's new K-12 Report outlines what schools can do to better protect their systems from cyber intrusions and overall risks.
40m listen -
NSA and CISA Assess Potential Threats to 5G
Jorge Laurel unpacks NSA’s recently published document examining potential security threats to 5G.
33m listen -
Cybersecurity Collaborative Targets Open-Source Software
CISA's Joint Cyber Defense Collaborative will focus on managing and preventing persistent cybersecurity threats, such as supply chain risk and open-source software.
7m read -
Cyber Defenders, Assemble! New Initiatives Address Cyber Risk
Cyber leaders, like superheroes, wind up to punch out malicious cyber actors.
27m listen -
OMB Urges Agencies to Begin Transition to Post-Quantum Cryptography
Federal agencies will need to incorporate post-quantum cryptography into their data security frameworks to avoid potential cybersecurity risks from quantum computers.
5m read -
Guide to GSA’s New Privileged Identity Playbook
CISA and GSA identity management leaders unpack new playbook.
26m listen