ISACA has updated its performance CSX Cybersecurity Practitioner (CSX-P) certification with expanded job tasks that span and test across five key security functions – Identify, Protect, Detect, Respond, and Recover.
Probationary employees—generally those with less than 1 or 2 years of federal service—can be especially vulnerable to reprisal because they have fewer protections from adverse personnel actions, including termination, the Government Accountability Office found.
The US Government Accountability Office reviewed four federal agencies and found that they did not have policies for coordinating assessments with states and none of them had policies for coordinating assessments with each other.
The number of devices connected to the internet is expected to reach 50 billion worldwide by the end of 2030, posing dangerous risks to people, businesses and critical systems.
To bolster the resilience of the Global Positioning System (GPS) and the wide scope of technologies and services that rely on precision timing, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) is requesting information from the public about the broad use of positioning, navigation and timing (PNT) services, as well as the cybersecurity risk management approaches used to protect them.
Researchers at NIST have developed a mathematical formula that, computer simulations suggest, could help 5G and other wireless networks select and share communications frequencies about 5,000 times more efficiently than trial-and-error methods.