Two groups representing state election officials are highlighting their past work with the Cybersecurity and Infrastructure Security Agency to deepen relationships ahead of Election Day, as the agency ...
House Homeland Security Chairman Andrew Garbarino (R-NY) is pushing for Senate Democrats to end the government shutdown and restore information sharing protections that lapsed on Sept. 30, in a press ...
A think tank focused on international security launches a report offering a cyber deterrence strategy framework calling for a shift to “robust accountability” at an event this week, while Dragos hosts ...
The Federal Communications Commission puts a spotlight on engagement efforts with telecom carriers to address “national security threats,” in a draft order to be considered at a Nov. 20 meeting that ...
National Cyber Director Sean Cairncross highlighted efforts to work across the interagency to build out the Trump administration’s upcoming cyber strategy and action plan, in an appearance at a Palo ...
CISA cyber chief Nick Andersen pointed to agency efforts to amplify cybersecurity messaging to the broader stakeholder community, in an appearance at a Palo Alto Networks event where he discussed new ...
The Cybersecurity and Infrastructure Security Agency has released a blueprint with the National Security Agency and international partners outlining best practices for Microsoft Exchange servers using ...
The Palo Alto Networks research team is providing details on an actively exploited vulnerability affecting a Microsoft operating system update service used by IT administrators, expanding on a recent ...
A McCrary Institute task force of cyber luminaries provides recommendations on addressing threats from China-based actors who are embedding into U.S. critical infrastructure, in a paper outlining each ...
The Federal Communications Commission has unanimously approved rules to add “modular transmitters” to a list of covered equipment banned in the United States due to national security risks, filling a ...
Advanced persistent threat actors are focused on targeting the U.S. technology sector, according to a report from cyber firm Trellix reviewing findings from a report detailing global cyber threat ...
“Most countries demonstrate strong commitments to cybersecurity legal frameworks, but many fall short on implementation. Legal commitments are the strongest pillar of cybersecurity preparedness for ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results