This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Engaging with Security Researchers: Embracing a “See Something, Say Something” Culture
Tag: CISA Blog
Engaging with Security Researchers: Embracing a “See Something, Say Something” Culture
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Engaging with Security Researchers: Embracing a “See Something, Say Something” Culture
A Message to Election Officials from CISA Director Jen Easterly
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: A Message to Election Officials from CISA Director Jen Easterly
Region 8 Invites You to Secure Our World
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Region 8 Invites You to Secure Our World
CISA Announces the FY 2024 Rural Emergency Medical Communications Demonstration Project (REMCDP) Cooperative Agreement Recipient
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Announces the FY 2024 Rural Emergency Medical Communications Demonstration Project…
CISA Director Jen Easterly Remarks at the Election Center 39th Annual National Conference in Detroit
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Director Jen Easterly Remarks at the Election Center 39th Annual…
CISA Director Jen Easterly Remarks at the 39th Annual National Conference in Detroit
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Director Jen Easterly Remarks at the 39th Annual National Conference…
Learn with Region 8’s Webinar Program
Join us each month for special events and webinars featuring topics crucial to infrastructure security. This article has been indexed from CISA Blog Read the original article: Learn with Region 8’s Webinar Program
Shaping the legacy of partnership between government and private sector globally: JCDC
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Shaping the legacy of partnership between government and private sector globally:…
SAFECOM and NCSWIC Develop Global Positioning System (GPS) for Public Safety Location Services: Use Cases and Best Practices
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: SAFECOM and NCSWIC Develop Global Positioning System (GPS) for Public Safety…
Region 10 Team Provides Vital Election Security Training for Idaho
Working with Region 10 cybersecurity, protective security, and election security advisors, the Idaho Secretary of State Office recently spearheaded a comprehensive initiative aimed at bolstering election security readiness through a virtual webinar training series. This article has been indexed from…
SAFECOM Membership Spotlight ft. Red Grasso, North Carolina Department of Information Technology
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: SAFECOM Membership Spotlight ft. Red Grasso, North Carolina Department of Information…
SAFECOM Releases New Resource for Cloud Adoption
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: SAFECOM Releases New Resource for Cloud Adoption
With Open Source Artificial Intelligence, Don’t Forget the Lessons of Open Source Software
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: With Open Source Artificial Intelligence, Don’t Forget the Lessons of Open…
NCSWIC’s Planning, Training, and Exercise Committee releases “Set Your PACE Plan” Flyer
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: NCSWIC’s Planning, Training, and Exercise Committee releases “Set Your PACE Plan”…
SAFECOM and NCSWIC Publish Fall 2023 Joint SAFECOM-NCSWIC Bi-Annual Meeting Executive Summaries
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: SAFECOM and NCSWIC Publish Fall 2023 Joint SAFECOM-NCSWIC Bi-Annual Meeting Executive…
NCSWIC Planning Training, and Exercise Committee releases the Human Factors Resource Guide
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: NCSWIC Planning Training, and Exercise Committee releases the Human Factors Resource…
Continued Progress Towards a Secure Open Source Ecosystem
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Continued Progress Towards a Secure Open Source Ecosystem
Looking Ahead to Better Prepare Today
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Looking Ahead to Better Prepare Today
Why SMBs Don’t Deploy Single Sign On (SSO)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Why SMBs Don’t Deploy Single Sign On (SSO)
CISA, SAFECOM and NCSWIC Publish SAFECOM Guidance on Emergency Communications Grants
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA, SAFECOM and NCSWIC Publish SAFECOM Guidance on Emergency Communications Grants
CISA Releases the FY 2024 Rural Emergency Medical Communications Demonstration Project (REMCDP) Notice of Funding Opportunity
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Releases the FY 2024 Rural Emergency Medical Communications Demonstration Project…
National Internet Safety Month: This June, Take 4 Easy Steps to Stay Safe Online
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: National Internet Safety Month: This June, Take 4 Easy Steps to…
NCSWIC releases the NCSWIC Video Series
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: NCSWIC releases the NCSWIC Video Series
A Plan to Protect Critical Infrastructure from 21st Century Threats
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: A Plan to Protect Critical Infrastructure from 21st Century Threats
Prepared Together – Cyber Storm IX Recap
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Prepared Together – Cyber Storm IX Recap
Securing Tomorrow: A Recap of CISA’s Cyber Resilient 911 Symposium (Central Region)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Securing Tomorrow: A Recap of CISA’s Cyber Resilient 911 Symposium (Central…
CISA Updates Toolkit with Nine New Resources to Promote Public Safety Communications and Cyber Resiliency
Since its last update in February 2024, the Toolkit has been updated to Version 24.1 with nine new resources. This article has been indexed from CISA Blog Read the original article: CISA Updates Toolkit with Nine New Resources to Promote…
Categorically Unsafe Software
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Categorically Unsafe Software
The Top Four Things Tech Manufacturers can do to Bolster the Cybersecurity of Target-Rich, Cyber-Poor Organizations
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: The Top Four Things Tech Manufacturers can do to Bolster the…
SAFECOM Publishes 2024 SAFECOM Strategic Plan
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: SAFECOM Publishes 2024 SAFECOM Strategic Plan
Honoring our Unsung Heroes – Celebrating Public Service Recognition Week
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Honoring our Unsung Heroes – Celebrating Public Service Recognition Week
Under the Digital Radar: Defending Against People’s Republic of China’s Nation-State Cyber Threats to America’s Small Businesses
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Under the Digital Radar: Defending Against People’s Republic of China’s Nation-State…
Opening Statement by CISA Director Jen Easterly
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Opening Statement by CISA Director Jen Easterly
During National Small Business Week, Take Steps to Secure Your Business
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: During National Small Business Week, Take Steps to Secure Your Business
CISA and FEMA IPAWS in Partnership with FCC Host Second National Meeting of Alerting Officials
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA and FEMA IPAWS in Partnership with FCC Host Second National…
CISA’s Efforts Towards Software Understanding
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA’s Efforts Towards Software Understanding
Cyber Hygiene Helps Organizations Mitigate Ransomware-Related Vulnerabilities
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Cyber Hygiene Helps Organizations Mitigate Ransomware-Related Vulnerabilities
The P25 Steering Committee, the Compliance Assessment Process and Procedures Task Group (CAPPTG), and the Joint SAFECOM-NCSWIC P25 User Needs Working Group (UNWG) release Project 25 Link Layer Encryption Informational Session
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: The P25 Steering Committee, the Compliance Assessment Process and Procedures Task…
Resilient Together with Priority Telecommunications Services (PTS)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Resilient Together with Priority Telecommunications Services (PTS)
NCSWIC Releases Roles and Responsibilities: Statewide Interoperability Coordinators Document
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: NCSWIC Releases Roles and Responsibilities: Statewide Interoperability Coordinators Document
Resilient Together, Highlighting the Importance of Emergency Communications
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Resilient Together, Highlighting the Importance of Emergency Communications
CISA Briefs World Travel Organization Expedia with Advice on Security
Bringing expertise from the cybersecurity and protective security worlds, three of CISA Region 10’s advisors presented to a worldwide audience recently at the Expedia Group in Seattle This article has been indexed from CISA Blog Read the original article: CISA…
Lessons from XZ Utils: Achieving a More Sustainable Open Source Ecosystem
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Lessons from XZ Utils: Achieving a More Sustainable Open Source Ecosystem
Cyber Resilient 911 Symposium Blog Post
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Cyber Resilient 911 Symposium Blog Post
CISA Joins the Minimum Viable Secure Product Working Group
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Joins the Minimum Viable Secure Product Working Group
JCDC Working and Collaborating to Build Cyber Defense for Civil Society and High-Risk Communities
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: JCDC Working and Collaborating to Build Cyber Defense for Civil Society…
JCDC Builds Foundation for Pipelines Cyber Defense Planning Effort
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: JCDC Builds Foundation for Pipelines Cyber Defense Planning Effort
Nothing Scares the PRC More Than a Russian Defeat in Ukraine
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Nothing Scares the PRC More Than a Russian Defeat in Ukraine
SAFECOM and NCSWIC Develop 911 Cybersecurity Resource Hub
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: SAFECOM and NCSWIC Develop 911 Cybersecurity Resource Hub
In Effort to Bolster Government Cybersecurity, Biden Administration Takes Step to Ensure Secure Development Practices
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: In Effort to Bolster Government Cybersecurity, Biden Administration Takes Step to…
Celebrating Women’s History Month
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Celebrating Women’s History Month
Super Tuesday: A Snapshot into CISA’s Mission to Secure the Electoral Process
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Super Tuesday: A Snapshot into CISA’s Mission to Secure the Electoral…
CISA Updates Toolkit to Promote Public Safety Communications and Cyber Resiliency
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Updates Toolkit to Promote Public Safety Communications and Cyber Resiliency
CISA Publishes Guide to Support University Cybersecurity Clinics
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Publishes Guide to Support University Cybersecurity Clinics
Reflecting on the Parkland tragedy, its lasting impacts, and work still to be done
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Reflecting on the Parkland tragedy, its lasting impacts, and work still…
Extending the Breadth and Depth of our Partnerships – JCDC 2024 Priorities
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Extending the Breadth and Depth of our Partnerships – JCDC 2024…
CISA Hosts Second Cyber Resilient 911 Symposium
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Hosts Second Cyber Resilient 911 Symposium
Opening Statement by CISA Director Jen Easterly
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Opening Statement by CISA Director Jen Easterly
SAFECOM Membership Spotlight: Major Darryl Anderson, SAFECOM At-Large (Stark County Sheriff’s Office)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: SAFECOM Membership Spotlight: Major Darryl Anderson, SAFECOM At-Large (Stark County Sheriff’s…
We Must Consider Software Developers a Key Part of the Cybersecurity Workforce
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: We Must Consider Software Developers a Key Part of the Cybersecurity…
CISA Finalizes Microsoft 365 Secure Configuration Baselines
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Finalizes Microsoft 365 Secure Configuration Baselines
security.txt: A Simple File with Big Value
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: security.txt: A Simple File with Big Value
Enabling Threat-Informed Cybersecurity: Evolving CISA’s Approach to Cyber Threat Information Sharing
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Enabling Threat-Informed Cybersecurity: Evolving CISA’s Approach to Cyber Threat Information Sharing
CISA Seeks Public Comment on Newly Developed Secure Configuration Baselines for Google Workspace
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Seeks Public Comment on Newly Developed Secure Configuration Baselines for…
Cybersecurity Performance Goals: Assessing How CPGs Help Organizations Reduce Cyber Risk
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Cybersecurity Performance Goals: Assessing How CPGs Help Organizations Reduce Cyber Risk
President Biden signs Executive Order 14111
President Biden signed Executive Order 14111 to reinforce the importance of, and strengthen, the security of Executive Branch federal facilities in the face of both persistent and emerging threats. This article has been indexed from CISA Blog Read the original…
CISA Resources to Help Schools Strengthen Security and Build Resilience
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Resources to Help Schools Strengthen Security and Build Resilience
CISA Office of Bombing Prevention Recognizes Critical Infrastructure Security and Resilience Month
In recognition of Critical Infrastructure Security and Resilience Month, CISA’s Office of Bombing Prevention is engaging with stakeholders nationwide on the impact of bombing incidents and threats to critical infrastructure. This article has been indexed from CISA Blog Read the…
CISA Announces Secure by Design Alert Series: How Vendor Decisions Can Reduce Harm at a Global Scale
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Announces Secure by Design Alert Series: How Vendor Decisions Can…
Unlocking Tomorrow’s Cybersecurity: A Sneak Peek into ReadySetCyber
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Unlocking Tomorrow’s Cybersecurity: A Sneak Peek into ReadySetCyber
Resilience in a Time of Uncertainty: National Chemical Security During the CFATS Lapse
But 2023 is not a normal November for CISA Chemical Security. This summer, Congress allowed the Chemical Facility Anti-Terrorism Standards program’s statutory authority to expire, leaving our nation without a regulatory chemical security program for the first time in 15…
Cybersecurity Insurance and Data Analysis Working Group Re-Envisioned to Help Drive Down Cyber Risk
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Cybersecurity Insurance and Data Analysis Working Group Re-Envisioned to Help Drive…
Piloting New Ground: Expanding Scalable Cybersecurity Services to Protect the Broader Critical Infrastructure Community
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Piloting New Ground: Expanding Scalable Cybersecurity Services to Protect the Broader…
Applying “Secure By Design” Thinking to Events in the News
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Applying “Secure By Design” Thinking to Events in the News
CISA Resources Can Help Underserved Communities Be More Resilient
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: CISA Resources Can Help Underserved Communities Be More Resilient
Region 3 in Action
Keep up with Region 3 as they work together with stakeholders across the critical infrastructure sectors! This article has been indexed from CISA Blog Read the original article: Region 3 in Action
Where Cybersecurity Starts in Region 2
On the Ground and Under the Sea: Where Cybersecurity Starts in Region 2 This article has been indexed from CISA Blog Read the original article: Where Cybersecurity Starts in Region 2
Expansion of the Secure Tomorrow Series Toolkit Now Available
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: Expansion of the Secure Tomorrow Series Toolkit Now Available
The Federal Partnership for Interoperable Communications (FPIC) Releases the Transition to Advanced Encryption Standard White Paper
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA Blog Read the original article: The Federal Partnership for Interoperable Communications (FPIC) Releases the Transition to…