House Homeland Security Chairman Andrew Garbarino (R-NY) is pushing for Senate Democrats to end the government shutdown and restore information sharing protections that lapsed on Sept. 30, in a press ...
A think tank focused on international security launches a report offering a cyber deterrence strategy framework calling for a shift to “robust accountability” at an event this week, while Dragos hosts ...
“Most countries demonstrate strong commitments to cybersecurity legal frameworks, but many fall short on implementation. Legal commitments are the strongest pillar of cybersecurity preparedness for ...
The Federal Communications Commission puts a spotlight on engagement efforts with telecom carriers to address “national security threats,” in a draft order to be considered at a Nov. 20 meeting that ...
CISA cyber chief Nick Andersen pointed to agency efforts to amplify cybersecurity messaging to the broader stakeholder community, in an appearance at a Palo Alto Networks event where he discussed new ...
The Palo Alto Networks research team is providing details on an actively exploited vulnerability affecting a Microsoft operating system update service used by IT administrators, expanding on a recent ...
A McCrary Institute task force of cyber luminaries provides recommendations on addressing threats from China-based actors who are embedding into U.S. critical infrastructure, in a paper outlining each ...
The White House should develop and publish an offensive cybersecurity strategy designating public sector and industry roles to encourage private sector buy-in on the one of the Trump administration’s ...
The Federal Communications Commission will consider an order at its Nov. 20 meeting to reverse a declaratory ruling issued under former Chairwoman Jessica Rosenworcel in January to place new ...
The international Counter Ransomware Initiative met on Oct. 26 during Singapore International Cyber Week, publishing guidance on supply chain resilience and an update on progress over the past year.
The Federal Communications Commission has unanimously approved rules to add “modular transmitters” to a list of covered equipment banned in the United States due to national security risks, filling a ...
Carnegie Mellon’s Software Engineering Institute is exploring the application of zero trust principles on weapons systems, in a recent study for the Air Force designed to help the Defense Department ...