Inside Cybersecurity

New Cyber Regulation News LEARN MORE

August 12, 2020

Home Page

Cyber Reg Watch: Analysis
By Charlie Mitchell

CISA’s work on critical functions across the economy continues to evolve toward a “multi-dimensional” platform for threat analysis, while the Pentagon’s cyber certification program moves toward testing, and the FCC is seeking input on implementation of its “rip-and-replace” program for removing Chinese gear from U.S. telecom systems.

By Sara Friedman

The Cybersecurity and Infrastructure Security Agency is developing a platform that can leverage work across its 16 critical infrastructure areas to determine areas of critical risk, a major step in CISA’s efforts to build an analytical hub of use to other federal agencies and private sector partners.

By Sara Friedman

A leading professor at the Defense Acquisition University is urging Defense Department commands and acquisition offices to hold off on adding requirements related to the Pentagon’s cyber certification program into their contract opportunities.

By Charlie Mitchell

The National Institute of Standards and Technology has released the final version of its zero trust architecture guide for civilian government agencies and others, with a gap analysis, use cases and a “high-level roadmap” for implementation by enterprises.

By Charlie Mitchell

The U.S. and China both have incentives to keep their “Phase One” trade deal in place despite growing tensions in other areas including cybersecurity, and that pact could provide a pathway to a broader normalization of relations between the countries in the future, according to an analyst with deep experience on China policy.

By Charlie Mitchell

Sen. Kamala Harris (D-CA), picked by presumptive Democratic presidential nominee Joe Biden to be his running mate, has worked on election security, bug bounties and other cybersecurity issues during her almost four years in the Senate.

Working Remotely?

If you are unable to access this service in the usual way because you are working remotely, let us know and we’ll provide you with temporary access credentials. Contact us at