Attorneys general from 23 states are urging the Commerce Department to address national security concerns over connected vehicle technology through a rulemaking that will allow for the federal ...
A significant shift in cyber policy is possible with new Republican chairs taking over key Senate committees as the GOP secured a majority by picking up seats in Ohio and West Virginia, and also won a ...
Russian efforts to spread election disinformation are growing in scale as voters go to the polls today, according to the latest statement from the intelligence community and the Cybersecurity and ...
CISA Director Jen Easterly says cyber attacks are expected to target election infrastructure in the build-up to certifying results but are unlikely to impact the integrity of voting due to extensive ...
An Iran-linked group known by researchers as “Cotton Sandstorm” is showing signs of preparations to scale up influence operations through election websites and media outlets, according to a ...
The Edison Electric Institute is asking the Defense Department to scope what is considered controlled unclassified information in the context of the Cybersecurity Maturity Model Certification program, ...
The Federal Communications Commission will vote at its November meeting on a notice of proposed rulemaking to dive into the security and resilience of submarine cables, by undertaking “major ...
As voters go to the polls on Election Day, expected shakeups will determine future cyber policy directions in the Senate while the outcomes will create opportunities for new leadership on key ...
The Information Security and Privacy Advisory Board meets this week to hear from federal officials and industry stakeholders on CISA’s secure by design initiative and NIST framework efforts, while ...
“ZT data security is not a tool that you can buy off the shelf and achieve overnight — it is a multi-year strategy that requires adaptability, investment, and collaboration. This guide aims to help ...
The Cloud Security Alliance is offering critical infrastructure owners and operators recommendations in a new guide for incorporating zero trust principles into operational technology and industrial ...