Experts say the national cyber strategy was the biggest development of 2023, but several other events also made for an interesting year in cyber.
More organizations worried about cybersecurity are turning to software bills of material (SBOMS). Getting them from software suppliers as a matter of compliance is one thing. Gaining cybersecurity intelligence from them is another.
In an email to agencies earlier this fall, CISA says email filtering and DNS sinkholing capabilities are no longer as valuable as they once were and are going away in December.
New guidance from lead cybersecurity agencies and industry partners provides both individual developers and large companies with software supply chain security best practices
The addition of security baselines for Google Workspace products comes after CISA already released baseline configurations for Microsoft 365.
The hackers were likely mapping the unidentified agency's network, but "no evidence is available to confirm successful data exfiltration or lateral movement during either incident," CISA says.
CISA has released a new secure software attestation form, and it will require the attention at the highest levels of a company.
CISA now has the equivalent of a perpetual "no-knock warrant" to probe the networks of federal agencies for major cyber vulnerabilities.
CISA has taken on more responsibilities for the defense of federal agency networks. A new report considers how much farther that should go.
Two tough new rules from the Federal Acquisition Regulation Council are coming, but originating with the Cybersecurity and Infrastructure Security Agency. They have to do with contractor incident reporting and for how contractors button up unclassified systems.
GSA plans to centralize its application security program amid a broader push to ensure the government only relies on secure software.
Recently, MITRE and the Cybersecurity and Infrastructure Security Agency (CISA) released the Open-Sourced Extension of MITRE's Caldera platform, specifically for operational technology. This is meant to be utilized by security teams to run automated adversary emulation exercises that are specifically focused on threats to operational technology.
A shutdown would potentially leave CISA with a skeleton crew to respond to cyber attacks on the networks of federal agencies and critical infrastructure.
Lawmakers are paying close attention to how CISA revamps its flagship federal cyber programs, like Continuous Diagnostics and Mitigation.
DHS' recommendations come amid a growing patchwork of cyber incident reporting rules and regulations.