Resources for Cybersecurity Clinics
CISA released this Resource Guide for Cybersecurity Clinics to outline ways CISA can partner with and support cybersecurity clinics and their clients.
Resources for Cybersecurity Clinics Read MoreNews and information resources.
CISA released this Resource Guide for Cybersecurity Clinics to outline ways CISA can partner with and support cybersecurity clinics and their clients.
Resources for Cybersecurity Clinics Read MoreCybersecurity Information Sheets (CSIs) to provide organizations with recommended best practices and/or mitigations to improve the security of their cloud environment(s)
CISA and NSA Release Cybersecurity Information Sheets on Cloud Security Best Practices Read MoreCISA has published the finalized Microsoft 365 Secure Configuration Baselines, designed to bolster the security and resilience of organizations’ Microsoft 365 (M365) cloud services.
CISA Releases Microsoft 365 Secure Configuration Baselines and SCuBAGear Tool Read MoreCISA has developed and published a factsheet, Free Tools for Cloud Environments, to help businesses transitioning into a cloud environment identify proper tools and techniques necessary for the protection of critical assets and data security.
CISA Develops Factsheet for Free Tools for Cloud Environments Read MoreThe U.S. Department of Defense officially adopted a series of ethical principles for the use of Artificial Intelligence today following recommendations provided to Secretary of Defense Dr. Mark T. Esper by the Defense Innovation Board last October.
DOD Adopts Ethical Principles for Artificial Intelligence Read MoreCybersecurity Awareness Month – observed every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online.
About Cybersecurity Awareness Month 2022 Read MoreYour iPhone now gives you lots of transparency into what your downloads are up to. Here’s what to look out for.
How to Read Your iOS 15 App Privacy Report Read MoreSimple cyber hygiene steps consumers can take to improve the cybersecurity of their mobile devices.
Mobile Device Cybersecurity Checklist for Consumers Read MoreData Privacy Week helps spread awareness about online privacy and educates citizens on how to manage their personal information and keep it secure. Data Privacy Week also encourages businesses to respect data and be more transparent about how they collect and use customer data.
Data Privacy Week – 2022 Read MoreThis is a CISA-managed catalog of known exploited vulnerabilities that carry significant risk to the federal enterprise.
Known Exploited Vulnerabilities Catalog Read MoreThese documents cover enhancing the Trusted Internet Connections (TIC) program to fully support the implementation of IPv6 in federal IT systems. This information is also applicable to the private business sector and those interested in improving Internet security.
CISA Releases Guidance: IPv6 Considerations for TIC 3.0 Read MoreSo, what can government and business leaders do to combat these attacks? And who’s responsible for improving our cybersecurity?
How America Can Reliably Resist Ransomware Read MoreThis paper provides Microsoft’s recommendations for password management based on current research and lessons from our own experience as one of the largest Identity Providers (IdPs) in the world. It covers recommendations for end users and identity administrators.
Microsoft Password Guidance Read MoreThis website is the U.S. Government’s official one-stop location for resources to tackle ransomware more effectively.
StopRansomware.gov website – The U.S. Government’s One-Stop Location to Stop Ransomware Read More“Light Blue Touchpaper” is the blog of the University of Cambridge Computer Laboratory and is written by researchers in the Security Group. Read here brief and timely essays on recent developments and topics related to computer security.
Light Blue Touchpaper Read MoreUse the nine “Avalanche Problems” to understand avalanche types. Learn to approach the mountain with an eye toward current avalanche conditions and avalanche problems to assist in making wise terrain choices.
Avalanche Problems Toolbox Read MoreAs technology—especially computer, information, and Internet technology—permeates all aspects of our society, people who understand that technology need to be part of public-policy discussions. We need technologists who work in the public interest. We need public-interest technologists.
Public-Interest Technology Resources Read MoreThe National Cyber Security Alliance’s (NCSA’s) CyberSecure My Business™ is a national program helping small and medium-sized businesses (SMBs) learn to be safer and more secure online.
CyberSecure My Business Read MoreThe Wasatch Backcountry Skiing Map is a three-dimensional map that, along with the companion Wasatch Backcountry Skiing Guide, provides a wealth of backcountry information. Cottonwood Canyons Weather Dashboard provides all you need to know weather-wise for the Cottonwood Canyons.
Wasatch Backcountry Skiing Guide & Map (2019) Read MoreSecurity – Your daily briefing on security, freedom, and privacy in the WIRED world.
WIRED.com – Security Read More