Playbook advises federal grant managers how to build cybersecurity into their programs

The guidance comes from the Office of the Director of National Cybersecurity and the Cybersecurity and Infrastructure Security Agency.

The post Playbook advises federal grant managers how to build cybersecurity into their programs appeared first on CyberScoop.

Continue reading Playbook advises federal grant managers how to build cybersecurity into their programs

How to remove the cybersecurity gridlock from the nation’s energy lifelines

A unified approach from both public and private sectors is essential to safeguard our critical infrastructure.

The post How to remove the cybersecurity gridlock from the nation’s energy lifelines appeared first on CyberScoop.

Continue reading How to remove the cybersecurity gridlock from the nation’s energy lifelines

Trump administration should focus on cyber rules, grants and international partnerships, Biden official says

Anne Neuberger made her remarks on priorities for the new administration on the same day the outgoing and incoming president met to discuss the transition.

The post Trump administration should focus on cyber rules, grants and international partnerships, Biden official says appeared first on CyberScoop.

Continue reading Trump administration should focus on cyber rules, grants and international partnerships, Biden official says

6 Principles of Operational Technology Cybersecurity released by joint NSA initiative

Today’s critical infrastructure organizations rely on operational technology (OT) to help control and manage the systems and processes required to keep critical services to the public running. However, due to the highly integrated nature of OT deployments, cybersecurity has become a primary concern. On October 2, 2024, the NSA (National Security Agency) released a new […]

The post 6 Principles of Operational Technology Cybersecurity released by joint NSA initiative appeared first on Security Intelligence.

Continue reading 6 Principles of Operational Technology Cybersecurity released by joint NSA initiative

Schneider Electric reports cyberattack, its third incident in 18 months

The ransomware group HellCat claims responsibility for the cyberattack and threatens to dump 40GB.

The post Schneider Electric reports cyberattack, its third incident in 18 months appeared first on CyberScoop.

Continue reading Schneider Electric reports cyberattack, its third incident in 18 months

Industry trade groups still have ‘concerns’ with cyber reporting mandate

21 organizations representing critical infrastructure interest groups ask Jen Easterly to have CISA go back to the drawing board.

The post Industry trade groups still have ‘concerns’ with cyber reporting mandate appeared first on CyberScoop.

Continue reading Industry trade groups still have ‘concerns’ with cyber reporting mandate

US offers $10 million bounty for members of Iranian hacking gang

A US $10 million reward is being offered to anyone who has information about four members of an Iranian hacking group.

The US government’s Rewards for Justice initiative is making the reward available for information about four men believed to be me… Continue reading US offers $10 million bounty for members of Iranian hacking gang

Task force unveils cyber recommendations for the next president

The 40-member panel has suggestions for whoever wins, from how to handle regulations to deterring malicious hackers.

The post Task force unveils cyber recommendations for the next president appeared first on CyberScoop.

Continue reading Task force unveils cyber recommendations for the next president

Alleged Anonymous Sudan leaders charged, prolific gang’s tool disabled

A criminal complaint says the group jeopardized lives via DDoS attack, with 35,000 attacks since the beginning of 2023.

The post Alleged Anonymous Sudan leaders charged, prolific gang’s tool disabled appeared first on CyberScoop.

Continue reading Alleged Anonymous Sudan leaders charged, prolific gang’s tool disabled

Organizations can substantially lower vulnerabilities with secure-by-design practices, report finds

Ex-National Cyber Director Inglis says “quantitative data” in Secure Code Warrior’s report shows the importance of the cybersecurity practice.

The post Organizations can substantially lower vulnerabilities with secure-by-design practices, report finds appeared first on CyberScoop.

Continue reading Organizations can substantially lower vulnerabilities with secure-by-design practices, report finds