Two groups representing state election officials are highlighting their past work with the Cybersecurity and Infrastructure Security Agency to deepen relationships ahead of Election Day, as the agency ...
House Homeland Security Chairman Andrew Garbarino (R-NY) is pushing for Senate Democrats to end the government shutdown and restore information sharing protections that lapsed on Sept. 30, in a press ...
A think tank focused on international security launches a report offering a cyber deterrence strategy framework calling for a shift to “robust accountability” at an event this week, while Dragos hosts ...
The Federal Communications Commission puts a spotlight on engagement efforts with telecom carriers to address “national security threats,” in a draft order to be considered at a Nov. 20 meeting that ...
National Cyber Director Sean Cairncross highlighted efforts to work across the interagency to build out the Trump administration’s upcoming cyber strategy and action plan, in an appearance at a Palo ...
CISA cyber chief Nick Andersen pointed to agency efforts to amplify cybersecurity messaging to the broader stakeholder community, in an appearance at a Palo Alto Networks event where he discussed new ...
The Cybersecurity and Infrastructure Security Agency has released a blueprint with the National Security Agency and international partners outlining best practices for Microsoft Exchange servers using ...
The Palo Alto Networks research team is providing details on an actively exploited vulnerability affecting a Microsoft operating system update service used by IT administrators, expanding on a recent ...
A McCrary Institute task force of cyber luminaries provides recommendations on addressing threats from China-based actors who are embedding into U.S. critical infrastructure, in a paper outlining each ...
The White House should develop and publish an offensive cybersecurity strategy designating public sector and industry roles to encourage private sector buy-in on the one of the Trump administration’s ...
The Federal Communications Commission has unanimously approved rules to add “modular transmitters” to a list of covered equipment banned in the United States due to national security risks, filling a ...
Policymakers should avoid creating policies that treat open-weight or open-source models differently from closed models and instead focus on tracking the origin and development of artificial ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results