News

Bridget Bean, executive director of the Cybersecurity and Infrastructure Security Agency, is leaving after three and a half years at the agency, including four months where she served as acting ...
Distributed denial-of-service attacks hit the financial services sector at an increased rate and level of sophistication in 2024, according to an annual report from the Financial Services Information ...
A new report from the RAND Corporation highlights the importance of collecting incident data as part of developing a federal cyber insurance backstop to cover catastrophic incidents and improve cyber ...
Rep. Andrew Garbarino (R-NY), a key voice for cybersecurity on the House Homeland Security Committee, has announced plans to run for chairmanship of the full committee in a statement to Inside ...
The House Appropriations Committee’s budget plan for the Cybersecurity and Infrastructure Security Agency provides $2.7 billion for fiscal 2026 with a focus on “cybersecurity defense technology and ...
President Trump’s June 6 cyber executive order eliminates the CISA verification aspect of requirements from the Biden administration for software providers to self-attest their compliance with ...
The project involves examining “six primary use cases” where SBOM can be applied to AI, Bardenstein said, and a report going into detail is “weeks away from completion,” with a version to be posted on ...
A bipartisan group of senators have reintroduced a bill to streamline how the government purchases and manages software through directing agencies to conduct inventories and provide insights to ...
The ICS Village joins forces with the Institute for Security and Technology to launch a revamped conference focused on cybersecurity for industrial control systems, while Capitol Hill activities this ...
President Trump has signed a highly anticipated cyber executive order making changes to requirements for software security and post-quantum cryptography put in place in the waning days of the Biden ...
CISA and the FBI are providing updated information on the “Play” ransomware group’s activities, a year and a half after publishing an initial advisory with Australian partners on how the threat actors ...
“The system security plan, system privacy plan, and cybersecurity supply chain risk management plan -- collectively referred to as system plans -- consolidate information about the assets and ...