Nathan Eddy works as an independent filmmaker and journalist based in Berlin, specializing in architecture, business technology and healthcare IT. He is a graduate of Northwestern University’s Medill ...
The National Institute of Standards and Technology (NIST) recently released their initial preliminary draft of NIST IR 8596, ...
On February 26, 2024, the National Institute of Standards and Technology (NIST) released the Cybersecurity Framework version 2.0 (CSF 2.0). CSF 2.0 is a generational update to NIST’s foundational ...
The National Institute of Standards and Technology (NIST) is seeking feedback on their draft Cybersecurity Framework (CSF) 2.0. The release of this public draft is an important milestone for ...
We knew this was coming. Now it has arrived. As reported by Government Technology in late February, NIST Releases Cybersecurity Framework 2.0: “NIST released its first major update to the framework ...
In place for almost a decade, the US National Institute of Standards and Technology (NIST)’s Cybersecurity Framework (CSF) has provided an important basis for securing critical infrastructure ...
The National Institute of Standards and Technology (NIST) has released an update to its Cybersecurity Framework — the first since the guidance document was issued in 2014. Cybersecurity Framework (CSF ...
A recent GAO audit report pointed out something that should come as no surprise: federal agencies face several challenges when it comes to cybersecurity. The challenges GAO cited include: Threats from ...
The National Institute of Standards and Technology has issued draft guidance on how federal agencies can implement the NIST Framework for Improving Critical Infrastructure for Cybersecurity. The Obama ...
While NIST's newly updated Cybersecurity Framework didn't catch many cyber professionals by surprise, it reflects many of the modern risks that organizations face, whether it be because of new ...
The rapid adoption of artificial intelligence has forced organizations to confront a hard truth: AI changes the cybersecurity equation.New attack surfaces, new misuse patterns and new forms of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results