Cybersecurity and Infrastructure Security Agency Director Jen Easterly is sending out a call for industry leaders to take on cybersecurity as a concern for the highest rungs on the corporate ladder, ...
The post starts with a review of CISA’s April notice of proposed rulemaking to establish an incident reporting regime required under the 2022 Cyber Incident Reporting for Critical Infrastructure Act. ...
The Senate Homeland Security Committee will hold two confirmation hearings on Jan. 15 with a morning session featuring Homeland Security Secretary nominee Kristi Noem, and President-elect Trump’s pick ...
Addressing China-affiliated cyber threats should be a priority for the Office of the National Cyber Director through working with sector risk management agencies to ensure adequate funding for those ...
NIST on Aug. 13 issued a set of Federal Information Processing Standards outlining protocols for three post-quantum cryptographic algorithms. One of the three standards, known as a “key encapsulation ...
The IT sector-specific goals are designed “to protect the sector from cyber incidents, identify and address vulnerabilities prior to product release, improve incident response, and significantly ...
Deputy National Security Advisor for Cyber Anne Neuberger sees an upcoming Biden cyber executive order as an effort to “repay the favor” by the previous administration when former President Trump took ...
“While the current Bad Practices Guidance primarily focuses on critical infrastructure, HackerOne encourages CISA and the FBI to consider expanding the recommendation for implementing a formal VDP to ...
Senate Minority Leader Charles Schumer (D-NY) has named a trio of freshman senators to join the Homeland Security and Governmental Affairs Committee, including Elissa Slotkin (D-MI), Andy Kim (D-NJ) ...
The White House has announced the formal launch of the U.S. Cyber Trust Mark program at the Federal Communications Commission after an 18-month effort to formally establish the structure and ...
The Cybersecurity and Infrastructure Security Agency has published final security requirements for restricted transactions that will be used by the Justice Department as part of a rulemaking to limit ...
“In recent years, numerous Internet routing incidents — such as Border Gateway Protocol (BGP) prefix hijacking, and route leaks — have resulted in denial of service (DoS), unwanted data traffic ...