18.4 F
Washington D.C.
Sunday, January 16, 2022
Category Template - Magazine PRO Homeland Security Today
HomeCybersecurity and Infrastructure Security Agency

Cybersecurity and Infrastructure Security Agency


Category Template - Magazine PRO Homeland Security Today

Cyber Threats to Critical Manufacturing Sector Industrial Control Systems

COVID-19 restrictions on the amount of onsite workers caused more critical manufacturing plants to adopt robotic process automation.

CISA, FBI, NSA, and International Partners Issue Advisory to Mitigate Apache Log4J Vulnerabilities

Every executive and leader is strongly encouraged to ensure their business, organization, or government agency is taking appropriate action.

CISA Hosts Election Cybersecurity Navigators Forum for State and Local Election Officials

DHS is currently in the midst of its “Election Security” sprint, focused on the need to cement the resilience of the nation’s democratic infrastructures.

CISA Holds Call with Critical Infrastructure Partners on Log4j Vulnerabilities and the Need for Increased Vigilance This Holiday Season

Since the initial vulnerability was discovered more than a week ago, CISA has led a national and global response effort.

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities.

NSA and CISA Publish Fourth Installment of 5G Cybersecurity Guidance

Ensure Integrity of Cloud Infrastructure provides guidance on platform integrity, build time security, launch time integrity, and more.

CISA Issues Emergency Directive Requiring Federal Agencies to Mitigate Apache Log4J Vulnerabilities

This emergency action is based on the current exploitation of these vulnerabilities by threat actors in external network environments.

Neuberger to Industry: Protect Against Malicious Cyber Activity Before the Holidays

In many cases criminals plan and actually begin an intrusion before the holiday itself – they infiltrate a network and lie in wait for the optimal time to launch an attack.
Stay Connected
Category Template - Magazine PRO Homeland Security Today
Latest Articles