House Homeland Security Chairman Andrew Garbarino (R-NY) is pushing for Senate Democrats to end the government shutdown and restore information sharing protections that lapsed on Sept. 30, in a press ...
A think tank focused on international security launches a report offering a cyber deterrence strategy framework calling for a shift to “robust accountability” at an event this week, while Dragos hosts ...
The Federal Communications Commission puts a spotlight on engagement efforts with telecom carriers to address “national security threats,” in a draft order to be considered at a Nov. 20 meeting that ...
National Cyber Director Sean Cairncross highlighted efforts to work across the interagency to build out the Trump administration’s upcoming cyber strategy and action plan, in an appearance at a Palo ...
CISA cyber chief Nick Andersen pointed to agency efforts to amplify cybersecurity messaging to the broader stakeholder community, in an appearance at a Palo Alto Networks event where he discussed new ...
The Palo Alto Networks research team is providing details on an actively exploited vulnerability affecting a Microsoft operating system update service used by IT administrators, expanding on a recent ...
The White House should develop and publish an offensive cybersecurity strategy designating public sector and industry roles to encourage private sector buy-in on the one of the Trump administration’s ...
A McCrary Institute task force of cyber luminaries provides recommendations on addressing threats from China-based actors who are embedding into U.S. critical infrastructure, in a paper outlining each ...
The United States should be skeptical of foreign adversary countries who are supporting the United Nations Convention Against Cybercrime, according to Lauryn Williams, a former senior leader at the ...
The Federal Communications Commission has unanimously approved rules to add “modular transmitters” to a list of covered equipment banned in the United States due to national security risks, filling a ...
Advanced persistent threat actors are focused on targeting the U.S. technology sector, according to a report from cyber firm Trellix reviewing findings from a report detailing global cyber threat ...
Carnegie Mellon’s Software Engineering Institute is exploring the application of zero trust principles on weapons systems, in a recent study for the Air Force designed to help the Defense Department ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results