CISA Director Jen Easterly emphasized the integrity of the election process on Wednesday in a statement highlighting work with state and local partners and ongoing efforts to assist with security of ...
The Biden administration’s approach to setting cyber requirements for individual sectors will face a challenge in the coming months with rulemakings that are not yet finalized and potential changes to ...
CISA Director Jen Easterly says cyber attacks are expected to target election infrastructure in the build-up to certifying results but are unlikely to impact the integrity of voting due to extensive ...
Generative AI has been able to lower the barrier for malicious actors to leverage cyber tools or disinformation campaigns, but it has not fundamentally introduced ...
The NIST 800-171 series focuses on protecting CUI on nonfederal systems. The agency finalized updates to NIST 800-171 and 800-171A in May and is now moving forward with updating 800-172 and 800-172A ...
The Edison Electric Institute is asking the Defense Department to scope what is considered controlled unclassified information in the context of the Cybersecurity Maturity Model Certification program, ...
The Information Security and Privacy Advisory Board meets this week to hear from federal officials and industry stakeholders on CISA’s secure by design initiative and NIST framework efforts, while ...
Attorneys general from 23 states are urging the Commerce Department to address national security concerns over connected vehicle technology through a rulemaking that will allow for the federal ...
The Federal Communications Commission recently met with Five Eyes partners to discuss national security and cyber threats in the communications sector, according to a readout from the regulatory ...
The Transportation Security Administration has released a long-awaited notice of proposed rulemaking directing owners and operators in the pipeline and railroad sectors to set up cyber risk management ...
The Cloud Security Alliance is offering critical infrastructure owners and operators recommendations in a new guide for incorporating zero trust principles into operational technology and industrial ...
An Iran-linked group known by researchers as “Cotton Sandstorm” is showing signs of preparations to scale up influence operations through election websites and media outlets, according to a ...