AI
AI

Tag: CISA

Is Secure by Design at CISA Finished? Will the Private Sector Honor Its Commitment?

Photo credit: www.csoonline.com Ahead of their discussion on Secure by Design at RSAC 2025, CSO engaged with Jason Healey, a...

Former CISA Director Krebs Departs from SentinelOne Following Trump’s Executive Order

Photo credit: www.cnbc.com Former Director of the Cybersecurity and Infrastructure Security Agency (CISA), Chris Krebs, appeared before a Senate hearing...

Leading Homeland Security Lawmaker Advocates for Cautious Reductions to CISA Funding

Photo credit: www.govexec.com Concerns Raised Over CISA Downsizing Amid Cybersecurity Challenges NASHVILLE, Tenn. — Mark Green, the Chairman of the House...

CISA to Implement Significant Staff Reductions in the Coming Days, Sources Reveal

Photo credit: www.govexec.com CISA Plans Significant Workforce Reductions Amid Concerns The Cybersecurity and Infrastructure Security Agency (CISA) is preparing to implement...

CISA Identifies Active Exploitation of Critical Backup Vulnerability in NAKIVO

Photo credit: www.csoonline.com Emerging Vulnerabilities in Backup Solutions: Industry Insights Recent developments in cybersecurity have unveiled critical vulnerabilities associated with popular...

White House Shields Cyber Experts from Mass Layoffs; Judge Reinstates CISA Employee Terminations

Photo credit: www.csoonline.com In a recent ruling, Judge James K. Bredar of the U.S. District Court in Maryland determined that...

CISA Seeks to Reconnect with Probationary Employees for Reinstatement Following Court Order

Photo credit: www.govexec.com Cybersecurity Agency Works to Reinstate Laid-Off Employees The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is actively reaching...

Trump Nominates Cyber Expert Sean Plankey as CISA Chief Amid Cuts and Layoffs at DOGE

Photo credit: www.csoonline.com CISA Welcomes New Leadership in Cybersecurity Amid Rising Threats Mark Montgomery, who previously served as the executive director...

CISA Alerts on Active Exploitation of Ivanti EPM Vulnerabilities

Photo credit: www.csoonline.com Credential Coercion According to cybersecurity expert Hanley, vulnerabilities related to credential coercion could pose serious risks. These flaws...

US Cyber Command and CISA Withdraw in Battle Against Russian Cyber Threats, Reports Indicate

Photo credit: www.csoonline.com Purported Shift at CISA Away from Reporting on Russian Threats Following a report from The Record, The Guardian...

CISA Alerts: Critical Vulnerability in Microsoft Partner Center Under Active Exploitation

Photo credit: www.csoonline.com Persistent Threats to Cloud-Based Ecosystems As organizations increasingly depend on cloud services and interconnected partner ecosystems, the attack...

CISA Warns of Active Exploitation of Critical Deserialization Vulnerabilities in Adobe and Oracle Software

Photo credit: www.csoonline.com In a blog entry from 2018, researchers from Code White identified significant security vulnerabilities in Adobe ColdFusion,...