The Department of Defense announced the strategic direction of the Cybersecurity Maturity Model Certification (CMMC) program, marking the completion of an internal program assessment led by senior leaders across the Department.
The U.S. Department of State is offering up to $10,000,000 for information leading to the identification or location of any individual(s) who hold a key leadership position in the DarkSide ransomware crime group.
"You can't expect to have the best and brightest if you're only recruiting from 50% of the population. You have to recruit from 100% of the population and if you don't, you're not going to get the best and brightest," said CyberWarrior COO Jonathan Edwards. The Cybersecurity and Infrastructure Security Agency (CISA) awarded CyberWarrior a grant to develop cyber workforce training for underserved populations.
The United States Government has added four foreign companies to the Entity List for engaging in activities contrary to the national security or foreign policy interests of the U.S.
Ransomware actors are using significant, time-sensitive financial events, such as mergers and acquisitions, to target and leverage victim companies, according to the Federal Bureau of Investigation (FBI) recent Private Industry Notification (PIN).
It’s vital for C-suites to include cybersecurity as part of their capital planning. And the key to that is determining what “just enough security” is for the organization to meet its business goals. What’s the best way to determine how much security is “just enough”?
Rohinee Mohindroo brings cybersecurity experience to the Chief Information Officer (CIO) position at Sitecore from her roles at three other firms, where she helped design cyber strategies to best defend against threats.
The Biden administration issued a broad new order — Binding Operational Directive 22-01 - Reducing the Significant Risk of Known Exploited Vulnerabilities — requiring nearly all federal agencies to patch hundreds of cybersecurity flaws considered major vulnerabilities for damaging intrusions into government computer systems.