Strong basics matter, but resilience now depends on visibility, control and clear ownership of risk across people, systems ...
Failure to complete routine patching continues to present cyber risks to the United States. Completion of certain cybersecurity tasks may be simple, yet they are not being done, leaving the United ...
A recent report by Censys, a leading cybersecurity software company, has exposed critical vulnerabilities in our nation's infrastructure. Their investigation revealed that over 430 industrial control ...
Use strong passwords: A strong password is your first line of defense against cyber threats. Use a combination of uppercase and lowercase letters, numbers and special characters. Avoid using easily ...
The Department of Defense (DoD) is making major changes to the Cybersecurity Maturity Model Certification (CMMC) program, ...
NEW YORK — Foreign adversaries are becoming more aggressive than ever before in efforts to target U.S. critical infrastructure, but owners and operators are still failing to meet basic security needs ...
What a year 2025 has been: Rich in both cyber events and innovations alike. On the latter, not a week has passed without a mention of innovation in Artificial Intelligence (AI). I am excited about the ...
Cybersecurity AI agents are on the rise as hacker use of artificial intelligence becomes more sophisticated. AI-generated video and voice deepfakes, personalized phishing campaigns, malware and ...
This is the second part of a two-part series examining the frontiers of cybersecurity in schools in the age of AI. Read the first installment, Under Siege: How Schools Are Fighting Back Against Rising ...
On 20 January 2026, the European Commission published another comprehensive proposal (The Cybersecurity Act 2) to revise the ...