Trusted App Stores: Protecting Security and Integrity

The mobile app store provisions of the DMA could undermine foundational security in the mobile phone ecosystem. The Center is concerned that a proliferation of ways to install apps will be overwhelming to users and open avenues for bad actors.

Industry Coalitions Push for NIST’s Secure Software Development Framework as Basis of CISA’s Secure-by-Design Initiative

The Cybersecurity Coalition and the Coalition to Reduce Cyber Risk submitted comments to the CISA on its whitepaper on security by design.

Cybersecurity Coalition, ADI Submit Comments on Updated Acquisition Regulations

The Cybersecurity Coalition, in partnership with the Alliance for Digital Innovation, submitted comments to U.S. government agencies regarding the proposed updates to the Federal Acquisition Regulations.

Hacking Policy Council Comments on NIST's responsibilities from AI EO

The Hacking Policy Council summited comments in response to the Request for Information (RFI) related to NIST’s responsibilities under the Artificial Intelligence Executive Order 14110.

Event Recap: 2024 Identity, Authentication, and the Road Ahead Policy Forum

A recap of the "Identity, Authentication, and the Road Ahead” Policy Forum hosted by the Better Identity Coalition, FIDO Alliance, and the Identity Theft Resource Center.

Hacking Policy Council Comments to New York State Department of Health on Proposed Hospital Cybersecurity Requirements

The Hacking Policy Council (“HPC”) submits the following comments in response to the New York Department of Health’s proposed addition to Section 405.46 to Title 10 NYCRR (“Hospital Cybersecurity Requirements).

Reframing the Conversation: A Deep Dive into the Encryption Debate

Governments say encryption prevents law enforcement from doing their job, but encryption protects everyone, including children and other vulnerable populations.

Breaking the endless loop and reframing the encryption debate

Encryption advocates and law enforcement are stuck in an endless loop when it comes to debating encryption. It's time for industry and law enforcement to sit down, discuss challenges, listen to one another, and work together to create solutions.

Vulnerability Management Under The Cyber Resilience Act

Companies should begin preparing now for the EU’s Cyber Resilience Act, a significant development in product security regulation and will apply to software and connected device manufacturers in and outside EU borders.

Joint industry comments push for permanent FCC Schools and Libraries Cybersecurity Program

Joint comments to the Federal Communications Commission call for permanent funding for Schools and Libraries Cybersecurity Program.