This latest version outlines a new strategy for developing interoperable devices and equipment and provides guidance and resources for grid cybersecurity.
In the wake of a wide-ranging hack involving SolarWinds IT management software and other commercial products, the White House is planning executive action to address cybersecurity gaps.
Sen. Mark Warner (D-Va.) wants more information from the FBI and the Environmental Protection Agency about the recent cybersecurity breach at a Florida water utility.
Building a more robust cybersecurity culture stands a better chance of repelling ransomware gangs than calling in the cavalry or paying off cybercriminals.
Security experts understand the desire of entrepreneurs and election officials to use new voting methods to reach voters who may be disenfranchised by in-person or mail-in voting, but the security risk might be too great, they say.
When the sheriff of Oldsmar, Fla., held a press conference to discuss a hack into the city’s water treatment facility, many cybersecurity experts were surprised – not by the hack, but by the publicity.
The Defense Department is working with the General Services Administration to work out reciprocity between the Cybersecurity Maturity Model Certification program and the Federal Risk and Authorization Management Program.
This year, agencies should expect not just greater adoption of automation, artificial intelligence and predictive analytics, but a more comprehensive security posture that includes everything from zero trust to continuous monitoring of the supply chain.
Attacks from China, Russia, Iran and North Korea will likely continue “until the leadership has decided that it cannot tolerate further behavior," former CISA Director Chris Krebs told the House Homeland Security Committee.
The unfortunate reality is that state and local agencies either don’t prioritize cybersecurity threats correctly or don’t have the money -- or the technical expertise -- to harden their computing environments on their own.