House lawmakers are now investigating a China-linked hack that reportedly involved the unclassified email accounts of Commerce Secretary Gina Raimondo and other high-level officials.
Two big ticket federal cybersecurity initiatives took big steps forward this week, but their ultimate outcomes remain less than certain
CISA's Michael Duffy provides an overview of the past, present and future of the landmark CDM program in an exclusive interview.
The White House on Thursday released an implementation plan for its National Cybersecurity Strategy. The plan outlines 65 high-impact initiatives agencies must meet to stay ahead of emerging threats, and sets a timeline to complete those goals.
CISA says a federal agency was only able to detect the infiltration of its email accounts because it had access to Microsoft's "enhanced" logging capabilities.
More than half of all federal agencies now automatically report into the CDM dashboard.
The CISA guidance helps fill a void where agencies have lacked common security standards and configurations for widely used services, like email and productivity capabilities.
Sources confirmed the Energy Department is treating it as "major incident," with other agencies uncovering intrusions as well.
The directive comes after suspected China state-backed hackers allegedly used network administration tools to access critical infrastructure systems.
A memo released today extends the deadline for when agencies have to start collecting secure software attestation forms from vendors.
If there is one civilian agency in the United States whose mission is as important to our national defense – and possibly more difficult – as the Defense Department, it is the Cybersecurity and Infrastructure Security Agency. So I invited CISA’s Deputy Director Nitin Natarajan to the studio recently to tell folks how his agency is dealing with those challenges.
The self-attestation form is where the rubber meets the road in the government's push to have its software vendors follow secure development practices.
While federal agencies search endlessly to hire people skilled in cybersecurity, local government might have a different way. How about enlisting volunteers to help protect critical infrastructure from cyber attacks. That's the idea behind a detailed set of recommendations from the law firm McDermott Will & Emery.
The government is grappling with the mechanics of addressing whether their software supply chain is secure. Download our new ebook to get a snapshot from leaders at CISA, the IT Industry Council and DoD’s National Counterintelligence and Security Center into current efforts.
No one can predict when disaster will occur. But organizations, whether government or private, can control how well they respond. It is all about risk mitigation and resilience.