Why Security and Privacy Matter in a Digital World
Credit: Yakobchuk_Vasyl/shutterstock.com One cannot pick up a newspaper, watch TV, listen to the radio, or scan the news on the internet without some direct or veiled reference to the lack of information security or intrusions into personal privacy. Many intrusions into government and private-sector systems have exposed sensitive mission, business and personal information. Every day […]
#StopRansomware: Ghost (Cring) Ransomware | CISA
Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see […]
Organizations and Cyber Safety | Cybersecurity and Infrastructure Security Agency CISA
Overview All organizations—regardless of size—need to adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. Implementing organizational cybersecurity best practices requires coordination across […]
Enhanced Visibility and Hardening Guidance for Communications Infrastructure
Introduction The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s (ASD’s) Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand’s National Cyber Security Centre (NCSC-NZ) warn that People’s Republic of China (PRC)-affiliated threat actors compromised networks of major global telecommunications […]
2023 Top Routinely Exploited Vulnerabilities
CVE-2023-3519 Citrix NetScaler ADC and NetScaler Gateway: 13.1 before 13.1-49.13 13.0 before 13.0-91.13 NetScaler ADC: 13.1-FIPS before 13.1-37.159 12.1-FIPS before 12.1-55.297 12.1-NDcPP before 12.1-55.297 Citrix ADC and Citrix Gateway Security Bulletin for CVE-2023-3519, CVE-2023-3466, CVE-2023-3467 Threat Actors Exploiting Citrix CVE-2023-3519 to Implant Webshells Critical Security Update for NetScaler ADC and NetScaler Gateway CVE-2023-4966 Citrix NetScaler ADC and NetScaler […]
Cybersecurity Skills and Workforce Frameworks
In furthering the National Cyber Workforce and Education Strategy, this environmental scan supports: Line of Effort 1.3.3 to promote the development of international standards and frameworks relating to foundational cyber skills, and Line of Effort 3.4.1 to collaborate with international partners and allies on workforce development best practices. The scan is a representative sample of […]
Executive Order 14028, Improving the Nation’s Cybersecurity
Improving the Nation’s Cybersecurity: NIST’s Responsibilities Under the May 2021 Executive Order Overview | Completed Assignments | Latest Updates Overview The President’s Executive Order (EO) 14028 on Improving the Nation’s Cybersecurity issued on May 12, 2021, charges multiple agencies – including NIST – with enhancing cybersecurity through a variety of initiatives related to the security and integrity of the software supply chain. Section 4 directs […]
cybersecurity – Glossary | CSRC
Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.Sources: CNSSI 4009-2015 from NSPD-54/HSPD-23 NIST SP 1800-10B under Cybersecurity from CNSSI 4009-2015, NSPD-54/HSPD-23 NIST SP 1800-25B under Cybersecurity from CNSSI 4009-2015, […]
Reference List
The following Reference List contains cybersecurity articles, strategies, reports, programs, and efforts that were compiled and consulted as part of an environmental scan to inform the assessment of current cybersecurity education and training efforts. Please note: These resources were referenced in 2017. Some of the original links may no longer be working and/or accurate. Download […]
Cybersecurity Risks
This page includes resources that provide overviews of cybersecurity risk and threats and how to manage those threats. The Risks & Threats section includes resources that includes threats and risks like ransomware, spyware, phishing and website security. The Risk Management section includes resources that describe the importance of managing risk and common security risk and […]