#ei-isac-funding

[ follow ]
#cisa
SF politics
fromNextgov.com
23 hours ago

CISA resources 'more limited than I would like' amid shutdown, top official says

CISA faces significant funding limitations impacting its ability to counter hacking threats and conduct essential activities.
SF politics
fromNextgov.com
1 week ago

Trump proposes cutting CISA election security program in FY27 budget

The Trump administration plans to cut $700 million from CISA, significantly impacting election security and infrastructure protection programs.
SF politics
fromSecurityWeek
1 week ago

White House Seeks to Slash CISA Funding by $707 Million

The Trump administration proposes a $707 million budget cut for CISA to refocus on core missions and eliminate inefficiencies.
SF politics
fromNextgov.com
23 hours ago

CISA resources 'more limited than I would like' amid shutdown, top official says

CISA faces significant funding limitations impacting its ability to counter hacking threats and conduct essential activities.
SF politics
fromNextgov.com
1 week ago

Trump proposes cutting CISA election security program in FY27 budget

The Trump administration plans to cut $700 million from CISA, significantly impacting election security and infrastructure protection programs.
SF politics
fromSecurityWeek
1 week ago

White House Seeks to Slash CISA Funding by $707 Million

The Trump administration proposes a $707 million budget cut for CISA to refocus on core missions and eliminate inefficiencies.
#cybersecurity
Careers
fromSecurityWeek
3 days ago

CISO Conversations: Ross McKerchar, CISO at Sophos

Ross McKerchar transitioned from IT to cybersecurity, becoming CISO at Sophos, emphasizing leadership skills and the growing cybersecurity profession.
Information security
fromTechCrunch
22 hours ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
Higher education
fromNextgov.com
3 days ago

CISA cancels CyberCorps summer internship hiring amid DHS shutdown

CISA reversed its decision to onboard summer interns due to a funding lapse in the Department of Homeland Security.
Silicon Valley
fromWIRED
5 days ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Careers
fromSecurityWeek
3 days ago

CISO Conversations: Ross McKerchar, CISO at Sophos

Ross McKerchar transitioned from IT to cybersecurity, becoming CISO at Sophos, emphasizing leadership skills and the growing cybersecurity profession.
Information security
fromTechCrunch
22 hours ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
EU data protection
fromSecurityWeek
1 day ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
Artificial intelligence
fromThe Verge
19 hours ago

Anthropic's new cybersecurity model could get it back in the government's good graces

Anthropic's relationship with the Trump administration has improved due to its new cybersecurity model, Claude Mythos Preview.
fromwww.bbc.com
4 hours ago

Counter-terror police investigate another arson attack

Commander Helen Flanagan stated, 'At this stage last night's arson is not being linked to other incidents in the north-west London area over the last week or last month's arson in Golders Green but counter terrorism officers are leading due to the similarities of each attack.'
London politics
Privacy professionals
fromWIRED
2 days ago

Congress Turns Up Pressure on DHS Over Palantir's Role in Immigration Crackdown

Members of Congress demand DHS and ICE disclose details on surveillance tools used in immigration enforcement.
US politics
fromNextgov.com
1 day ago

Secret Service is embracing new solutions to combat malicious drones, director says

The U.S. Secret Service is adopting kinetic mitigation technologies to counter drone threats for upcoming large-scale events.
fromTruthout
1 day ago

Palantir Paid $0 in Federal Income Tax in 2025 While Raking in Taxpayer Funds to Surveil Americans

Palantir Technologies, despite earning $1.6 billion in net income last year, did not pay any federal income taxes due to favorable tax policies that allow corporations to dodge taxes.
European startups
Washington DC
fromNextgov.com
2 days ago

Pentagon announces senior appointments to CIO's office

Five officials appointed to the Pentagon's CIO office to enhance technology management and drive transformation.
Careers
fromFortune
2 days ago

This CEO pirated video games as a teen and became a hacker for the Air Force. Now he's built a $3 billion cyber firm | Fortune

Gen Z should trust instincts in career paths, as demonstrated by Kyle Hanslovan's unconventional journey to CEO of a $3 billion cybersecurity firm.
Venture
fromSecurityWeek
3 days ago

Capsule Security Emerges From Stealth With $7 Million in Funding

Capsule Security provides a security layer for AI agents to prevent manipulation and ensure safe operations.
#artificial-intelligence
UK politics
fromComputerWeekly.com
4 days ago

Flood warning: How citizens' AI agents will swamp public services | Computer Weekly

AI has the potential to transform public services by reducing user friction and improving access for citizens.
UK politics
fromComputerWeekly.com
4 days ago

Flood warning: How citizens' AI agents will swamp public services | Computer Weekly

AI has the potential to transform public services by reducing user friction and improving access for citizens.
SOMA, SF
fromKqed
4 days ago

DOJ: Man Who Attacked Sam Altman's House Threatened to Kill Other Tech CEOs | KQED

A Texas man faces charges for attempted murder of OpenAI CEO Sam Altman after violent attacks at his home and company headquarters.
Business intelligence
fromNextgov.com
4 days ago

Agencies are missing a step to share information on better AI acquisition, GAO finds

Agencies must enhance sharing of lessons learned in AI acquisition to improve the procurement process.
#nist
Information security
fromSecurityWeek
2 days ago

NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

NIST updates its National Vulnerability Database operations to prioritize enriching critical CVEs due to a surge in submissions.
Information security
fromTechzine Global
2 days ago

NIST updates NVD: not every CVE will be scrutinized

NIST is updating its vulnerability assessment methodology due to an overwhelming increase in CVEs, prioritizing critical vulnerabilities for analysis.
Information security
fromSecurityWeek
2 days ago

NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

NIST updates its National Vulnerability Database operations to prioritize enriching critical CVEs due to a surge in submissions.
Information security
fromTechzine Global
2 days ago

NIST updates NVD: not every CVE will be scrutinized

NIST is updating its vulnerability assessment methodology due to an overwhelming increase in CVEs, prioritizing critical vulnerabilities for analysis.
#ai
Information security
fromSecurityWeek
4 days ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
Information security
fromSecurityWeek
4 days ago

'Mythos-Ready' Security: CSA Urges CISOs to Prepare for Accelerated AI Threats

Mythos from Anthropic poses a significant threat by accelerating the timeline between vulnerability detection and exploitation in cybersecurity.
Information security
fromTechzine Global
3 days ago

GPT-5.4-Cyber aims to further embed AI in cybersecurity

OpenAI's GPT-5.4-Cyber enhances generative AI for cybersecurity, focusing on defensive applications and providing trusted users with advanced capabilities.
Information security
fromTechzine Global
4 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
EU data protection
fromComputerWeekly.com
1 day ago

CYBERUK '26: UK lagging on legal protections for cyber pros | Computer Weekly

The outdated Computer Misuse Act hinders UK cyber security innovation and needs urgent reform to protect cyber professionals.
Software development
fromZDNET
3 days ago

'Like handing out the blueprint to a bank vault': Why AI led one company to abandon open source

Cal is shifting from open source to proprietary licensing due to security risks posed by modern AI tools.
Artificial intelligence
fromFortune
1 day ago

AI cybersecurity capabilities require urgent international cooperation, AI godfather Bengio says | Fortune

Yoshua Bengio emphasizes the urgent need for international cooperation in addressing AI's risks, particularly with the release of Anthropic's Mythos model.
Artificial intelligence
fromTechRepublic
1 day ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
Podcast
fromSecuritymagazine
3 weeks ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
Artificial intelligence
fromFortune
3 days ago

A retired general's warning: America can't fight the AI arms race on tech it doesn't control | Fortune

The U.S. faces a critical AI arms race affecting military power and national security, highlighted by the Anthropic-Pentagon standoff over AI usage control.
Information security
fromTheregister
23 hours ago

CISA tells feds to patch 13-year-old Apache ActiveMQ bug

CISA warns of a critical Apache ActiveMQ vulnerability requiring federal agencies to patch within two weeks to prevent exploitation.
Information security
fromTechCrunch
1 day ago

European police email 75,000 people asking them to stop DDoS attacks | TechCrunch

A global law enforcement operation targeted over 75,000 alleged cybercriminals using DDoS-for-hire services, resulting in arrests and domain takedowns.
Information security
fromComputerworld
1 day ago

Cisco Systems issues three advisories for critical vulnerabilities in Webex, ISE

Identity and access management is crucial for cybersecurity, with a focus on IAM hygiene necessary to mitigate risks from vulnerabilities.
#cisco
Information security
fromSecurityWeek
2 days ago

Cisco Patches Critical Vulnerabilities in Webex, ISE

Cisco patched 15 vulnerabilities, including critical flaws in Webex and Identity Services Engine, allowing potential unauthorized access and command execution.
Information security
fromThe Hacker News
2 days ago

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

Cisco has released patches for four critical security vulnerabilities in Identity Services and Webex Services that could allow unauthorized access and code execution.
Information security
fromSecurityWeek
2 days ago

Cisco Patches Critical Vulnerabilities in Webex, ISE

Cisco patched 15 vulnerabilities, including critical flaws in Webex and Identity Services Engine, allowing potential unauthorized access and command execution.
Information security
fromThe Hacker News
2 days ago

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

Cisco has released patches for four critical security vulnerabilities in Identity Services and Webex Services that could allow unauthorized access and code execution.
Information security
fromSecurityWeek
3 days ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
Information security
fromSecurityWeek
3 days ago

'By Design' Flaw in MCP Could Enable Widespread AI Supply Chain Attacks

MCP's architectural flaw allows adversarial takeover of user systems, exposing sensitive data and enabling malware installation.
Information security
fromSecurityWeek
3 days ago

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

A sophisticated threat disguised as adware compromised over 25,000 endpoints, allowing silent control through an unregistered domain.
Information security
fromSecuritymagazine
3 days ago

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

The executive protection model must evolve from a reactive approach to a comprehensive security infrastructure due to increased accessibility of personal information.
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
#iam
Information security
fromInfoWorld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
3 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromZero Day Initiative
3 days ago

Zero Day Initiative - The April 2026 Security Update Review

Several critical vulnerabilities in Microsoft products require attention, particularly those related to Office, RDP, Active Directory, and .NET Framework.
US politics
fromTheregister
2 months ago

CISA insider-threat warning comes with an ironic twist

Insider threats are among the most serious security risks and require multidisciplinary teams and decisive action to detect, mitigate, and prevent damage.
Information security
fromArs Technica
3 days ago

UK gov's Mythos AI tests help separate cybersecurity threat from hype

Mythos outperformed previous models in TLO tests, showing capability in attacking vulnerable systems but still facing limitations in complex scenarios.
fromwww.businessinsider.com
4 days ago

We're in a new era of heightened CEO safety measures, security pros say

This attack is just shedding light on the fact that you're even more vulnerable outside of the office, said Don Aviv, CEO of Interfor International, a security consultancy.
Information security
Information security
fromThe Hacker News
4 days ago

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

Critical risk findings surged by nearly 400% amid a 52% increase in raw alert volume, driven by AI-assisted development.
Information security
fromAxios
3 days ago

OpenAI expands access to cyber AI as hacking risks grow

OpenAI is shifting to a model that emphasizes identity verification for access to sensitive cybersecurity tools while expanding availability.
fromNextgov.com
1 month ago

US cyber responses will be 'linked to adversary actions' and involve industry coordination, official says

Future U.S. government responses in cyberspace will be "linked to adversary actions" and will involve coordination between the private sector and smaller governments, a top White House official said Thursday. The dynamic, which will be codified in a forthcoming national cyber strategy, is meant to make clear that foreign adversaries' actions that target U.S. networks have consequences, according to Alexandra Seymour, who serves as the principal deputy assistant national cyber director for policy in the Office of the National Cyber Director.
US politics
Information security
fromTechCrunch
5 days ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Information security
fromTechRepublic
1 week ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
#ai-cybersecurity
Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromZDNET
3 weeks ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromZDNET
3 weeks ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
Information security
fromComputerworld
4 weeks ago

CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group

CISA urges organizations to harden endpoint management system configurations, particularly Microsoft Intune, following a pro-Iranian threat actor's compromise of Stryker's systems.
Information security
fromThe Cipher Brief
1 month ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
Information security
fromNextgov.com
1 month ago

CISA, FBI have engaged with Stryker staff after cyberattack, official says

CISA and FBI are assisting Stryker in responding to a major cyberattack claimed by an Iran-aligned hacking group that disrupted employee access and systems worldwide.
Information security
from24/7 Wall St.
1 month ago

Why Cybersecurity ETF CIBR Belongs in Every Retirement Portfolio Right Now

CIBR tracks cybersecurity companies but has underperformed the broader market over the past five years due to valuation compression in high-growth tech names.
fromDataBreaches.Net
1 month ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
fromNextgov.com
2 months ago

AI info-sharing center is in development, CISA official says

We just want to make sure we've got the right elements of, how do we pull together people, and how do we take advantage of the leadership position that we have
Information security
Information security
fromSilicon Canals
1 month ago

ITC Secure and IronNet Unite to Form Collective Defence, a New Force in Critical Infrastructure Protection Against Hybrid Warfare - Silicon Canals

Collective Defence combines ITC Secure and IronNet to protect critical infrastructure from state-sponsored and hybrid threats using AI-driven cybersecurity and collaborative threat sharing.
Information security
fromThe Hacker News
1 month ago

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

CISA added four actively exploited high-severity vulnerabilities to its KEV catalog, including Chrome use-after-free, TeamT5 arbitrary upload, Zimbra SSRF, and Windows ActiveX RCE.
[ Load more ]