Inside Cybersecurity

March 19, 2024

Home Page

Home Page

By Sara Friedman

The House’s move to overwhelmingly pass legislation on TikTok shows an increased interest from lawmakers in addressing national security threats from China, as the Biden administration also ramps up its efforts to address specific sectors in the U.S. supply chain.

By Sara Friedman

The Edison Electric Institute makes recommendations for how controlled unclassified information should be addressed in Defense Department contracts in a manner that aligns with current practices for sharing sensitive data in the electric sector.

By Jacob Livesay

The Open Source Security Foundation is investigating how developers can be better equipped to create, deploy and maintain secure software, with the launch of a new survey on how organizations and IT professionals are looking to enhance their security posture.

By Jacob Livesay

The CISA Cybersecurity Advisory Committee meets this week to share updates on work to build critical infrastructure resilience and secure by design efforts, while the Information Security and Privacy Advisory Board convenes to discuss software security, cryptography, artificial intelligence and zero trust.

By Sara Friedman

The National Institute of Standards and Technology will continue to play a role in the development of requirements that can be incorporated into the FCC’s cybersecurity labeling program for Internet of Things products, which was formally established Thursday through a final order at a commission meeting.

By Jacob Livesay

The Cybersecurity and Infrastructure Security Agency can boost cyber posture across all critical infrastructure sectors by launching an “observatory” to gain visibility into supply chain dependencies that malicious actors could attack to disrupt critical services, according to a recent report from a federal tech advisory panel.

By Jacob Livesay

The Food and Drug Administration has released a draft update for guidance on medical device cybersecurity, proposing the addition of information on how to provide documentation of cyber requirements that must be fulfilled when submitting products to the agency for premarket review.

Topics