CISA orders federal agencies to secure Microsoft cloud systems after ‘recent’ intrusions

Jonathan Greig reports: Federal civilian agencies were ordered to secure their Microsoft cloud systems after several recent cyber incidents. The Cybersecurity and Infrastructure Security Agency (CISA) issued a binding directive on Tuesday giving federa… Continue reading CISA orders federal agencies to secure Microsoft cloud systems after ‘recent’ intrusions

Playbook advises federal grant managers how to build cybersecurity into their programs

The guidance comes from the Office of the Director of National Cybersecurity and the Cybersecurity and Infrastructure Security Agency.

The post Playbook advises federal grant managers how to build cybersecurity into their programs appeared first on CyberScoop.

Continue reading Playbook advises federal grant managers how to build cybersecurity into their programs

CISA pitches updated cyber incident response plan as an ‘agile, actionable’ framework

The agency is seeking public comment on its much-anticipated draft update to 2016’s PPD-41.

The post CISA pitches updated cyber incident response plan as an ‘agile, actionable’ framework appeared first on CyberScoop.

Continue reading CISA pitches updated cyber incident response plan as an ‘agile, actionable’ framework

Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches

The annual defense spending bill contains money the FCC has sought to use to reimburse telecommunications carriers for removing Chinese equipment.

The post Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches appeared first on CyberScoop.

Continue reading Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches

Wyden legislation would mandate FCC cybersecurity rules for telecoms

It would go beyond the FCC’s own proposal to regulate telecommunications carriers under federal wiretapping law.

The post Wyden legislation would mandate FCC cybersecurity rules for telecoms appeared first on CyberScoop.

Continue reading Wyden legislation would mandate FCC cybersecurity rules for telecoms

How to choose secure, verifiable technologies?

The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring softwa… Continue reading How to choose secure, verifiable technologies?

U.S. government says Salt Typhoon is still in telecom networks

The United States and other Western nations released guidance Tuesday designed to evict the China-linked group in the wake of the high-profile hack.

The post U.S. government says Salt Typhoon is still in telecom networks appeared first on CyberScoop.

Continue reading U.S. government says Salt Typhoon is still in telecom networks

Inside a new initiative to lend cybersecurity volunteers to organizations that need it most

The idea behind the initiative, details of which CyberScoop is first reporting, is that too much cyber expertise doing volunteer work is uncoordinated.

The post Inside a new initiative to lend cybersecurity volunteers to organizations that need it most appeared first on CyberScoop.

Continue reading Inside a new initiative to lend cybersecurity volunteers to organizations that need it most

Alleged Russian Phobos ransomware administrator extradited to U.S., in custody

Evgenii Ptitsyn is said to have helped operate a ransomware-as-a-service organization that extorted millions from more than 1K victims, including schools and hospitals.

The post Alleged Russian Phobos ransomware administrator extradited to U.S., in custody appeared first on CyberScoop.

Continue reading Alleged Russian Phobos ransomware administrator extradited to U.S., in custody

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, “nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities.” These actors pose a critical threat to United States infrastructure and protected data, and […]

The post Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity appeared first on Security Intelligence.

Continue reading Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity