|
You are here |
cltc.berkeley.edu | ||
| | | | |
www.nextgov.com
|
|
| | | | | The administration calls for a standardized federal playbook and review board for incident response, as well as changes to software procurement. | |
| | | | |
blog.augustschell.com
|
|
| | | | | The Cybersecurity Executive Order makes protecting federal networks, updating systems, and directing agencies to work together a priority. | |
| | | | |
blog.adolus.com
|
|
| | | | | President Biden has signed an Executive Order on Cybersecurity. This blog outlines its implications and provides a detailed Timeline with key dates. | |
| | | | |
www.sysdig.com
|
|
| | | A new supply chain attack against the NPM repository is using novel, self-propagating malware (also known as a worm) to continue spreading itself. | ||