The Cybersecurity and Infrastructure Security Agency is introducing a new strategic approach for 2024 called the Federal Enterprise Operations Cyber Alignment Plan.
Officials at the VA and Treasury say CISA should offer more centralized support to agencies through its cyber services and the Joint Cyber Defense Collaborative.
Agencies have just over 24 hours to shut down any instances of affected Ivanti VPN products, per a new directive from CISA.
NGA's neurodiversity pilot has been an outlier. But other federal agencies are starting to take steps to embrace neurodiverse talent.
The 5th annual President’s Cup Cyber Competition is accepting teams and individual competitors in the annual “capture the flag” competition that also includes industrial control systems for the first time.
The Cybersecurity and Infrastructure Security Agency issued an emergency directive after software firm Ivanti discovered vulnerabilities in two widely-used products.
The CSRB is modeled after the National Transportation Safety Board, but some experts say the cyber board needs more independence and transparency.
Matt House, the program manager for the CDM program at CISA, said the governmentwide dashboard is in a good place in terms of delivering quality data.
Experts say the national cyber strategy was the biggest development of 2023, but several other events also made for an interesting year in cyber.
More organizations worried about cybersecurity are turning to software bills of material (SBOMS). Getting them from software suppliers as a matter of compliance is one thing. Gaining cybersecurity intelligence from them is another.
In an email to agencies earlier this fall, CISA says email filtering and DNS sinkholing capabilities are no longer as valuable as they once were and are going away in December.
New guidance from lead cybersecurity agencies and industry partners provides both individual developers and large companies with software supply chain security best practices
The addition of security baselines for Google Workspace products comes after CISA already released baseline configurations for Microsoft 365.
The hackers were likely mapping the unidentified agency's network, but "no evidence is available to confirm successful data exfiltration or lateral movement during either incident," CISA says.
CISA has released a new secure software attestation form, and it will require the attention at the highest levels of a company.