Information Sharing - U.S. Legal and Regulatory Guidance

Information sharing about cybersecurity threats and vulnerabilities produces enormous benefits, however, within the U.S. reaping the benefits of can be challenging. This paper aims to provide some guidance on how to move forward and minimize risk.

CISA Shifts Federal Cyber Security Landscape with Sweeping Mandate to Replace End-Of-Life Network Devices

CISA issued a compulsory directive to all federal agencies targeting boundary network devices that are “end-of-service."

Shoring Up Subsea Cable Security

A Policy Roadmap to Enhance Resilience in Europe

Cybersecurity Coalition, FIDO Alliance Raise Concerns About Proposed New Data Collection for Visa Waiver Program

The Cybersecurity Coalition and FIDO Alliance raised concerns about the Homeland Security’s proposed new data collection from travelers in the visa waiver program.

What States Can Learn from North Carolina’s Approach to Securing Government

As states across the country grapple with how to adopt AI responsibly, North Carolina offers a compelling case study - not because it has all the answers, but because it has built the institutional muscle to learn, adapt, and lead.

Event Recap: Secure DNS and the Evolution of NIST SP 800-81

The Center for Cybersecurity Policy and Law held an event with industry and government stakeholders to discuss the importance of securing the Domain Name System (DNS) to combat increasing global cybersecurity threats.

Cybersecurity Coalition, Hacking Policy Council Comment on NIST Cyber AI Profile

The Cybersecurity Coalition and the Hacking Policy Council submitted comments to NIST in response to the initial public draft of the Cybersecurity Artificial Intelligence Community Profile.

Developing a National Cybersecurity Strategy

Developing a national cybersecurity strategy is a critical investment a government can make to secure its future. This paper outlines the components and offers a framework with the tools to design, implement, and improve their strategies.

FedRAMP Signals Acceleration of Requirements for Machine-Readable Packages in the Rev5 Process

FedRAMP has proposed modifications to the Rev5 process in the newly published RFCs that could enact major changes and require Cloud Service Offerings to provide authorization packages in a “machine-readable format.”

Yet Another Blog about 'Cyber Operations' Part I: The Lexicon

The vocabulary around cyber operations has become muddled with policymakers often conflating terms. This post aims to set a standard lexicon for all to use moving forward.