Information Sharing - U.S. Legal and Regulatory Guidance
Information sharing about cybersecurity threats and vulnerabilities produces enormous benefits, however, within the U.S. reaping the benefits of can be challenging. This paper aims to provide some guidance on how to move forward and minimize risk.
CISA Shifts Federal Cyber Security Landscape with Sweeping Mandate to Replace End-Of-Life Network Devices
CISA issued a compulsory directive to all federal agencies targeting boundary network devices that are “end-of-service."
Cybersecurity Coalition, FIDO Alliance Raise Concerns About Proposed New Data Collection for Visa Waiver Program
The Cybersecurity Coalition and FIDO Alliance raised concerns about the Homeland Security’s proposed new data collection from travelers in the visa waiver program.
What States Can Learn from North Carolina’s Approach to Securing Government
As states across the country grapple with how to adopt AI responsibly, North Carolina offers a compelling case study - not because it has all the answers, but because it has built the institutional muscle to learn, adapt, and lead.
Event Recap: Secure DNS and the Evolution of NIST SP 800-81
The Center for Cybersecurity Policy and Law held an event with industry and government stakeholders to discuss the importance of securing the Domain Name System (DNS) to combat increasing global cybersecurity threats.
Cybersecurity Coalition, Hacking Policy Council Comment on NIST Cyber AI Profile
The Cybersecurity Coalition and the Hacking Policy Council submitted comments to NIST in response to the initial public draft of the Cybersecurity Artificial Intelligence Community Profile.
Developing a National Cybersecurity Strategy
Developing a national cybersecurity strategy is a critical investment a government can make to secure its future. This paper outlines the components and offers a framework with the tools to design, implement, and improve their strategies.
FedRAMP Signals Acceleration of Requirements for Machine-Readable Packages in the Rev5 Process
FedRAMP has proposed modifications to the Rev5 process in the newly published RFCs that could enact major changes and require Cloud Service Offerings to provide authorization packages in a “machine-readable format.”
Yet Another Blog about 'Cyber Operations' Part I: The Lexicon
The vocabulary around cyber operations has become muddled with policymakers often conflating terms. This post aims to set a standard lexicon for all to use moving forward.

