The National Institute of Standards and Technology has announced plans to update its position, navigation and timing profile of the cybersecurity framework and is asking for feedback from stakeholders ...
House Oversight ranking member Gerry Connolly (D-VA) has sent letters to several cabinet members asking for details on how President Trump’s “Department of Government Efficiency” is using artificial ...
FCC Chairman Brendan Carr is launching a Council for National Security cutting across the commission’s regulatory, investigative and enforcement activities to address threats from China, including the ...
The Cyberspace Solarium Commission is celebrating the five-year anniversary this week of the publication of its landmark report which led to significant changes to the federal cybersecurity landscape ...
The Senate Commerce Committee has passed a bill directing the National Telecommunications and Information Administration to conduct a study on the security risks of consumer routers developed or ...
The federal government should continue efforts to provide support to state and local governments for improving their cyber posture after a four-year grant program administered by CISA and FEMA ...
The Cybersecurity and Infrastructure Security Agency has published an advisory in partnership with the Multi-State Information Sharing and Analysis Center and the FBI on a ransomware variant known as ...
Homeland Security Secretary Kristi Noem is terminating the Critical Infrastructure Partnership Advisory Council, according to a Federal Register notice scheduled for publication today, eliminating an ...
Former National Cyber Director Chris Inglis is proposing moving the influential Cyber Safety Review Board to operate under the purview of the NCD office, following the dismissal of the board’s private ...
The Business Software Alliance is raising concerns to Homeland Security Secretary Kristi Noem over guidance developed by the Cybersecurity and Infrastructure Security Agency, arguing that the agency ...
“NIST has selected a backup algorithm that can provide a second line of defense for the task of general encryption, which safeguards internet traffic and stored data alike,” the agency says in a March ...
Compromised credentials and software exploits were the top two drivers of ransomware attacks in 2024, together accounting for over 75 percent of successful breaches, according to an annual report from ...