Tag: Guidelines
-
ACSC and CISA Launch Critical OT Cybersecurity Guidelines
A new guide, Principles of Operational Technology Cybersecurity, has been released by the Australian Cyber Security Centre (ACSC) in …
-
HPC Still Looks Past Security, but New Guidelines and Tools Push it Ahead
A U.S. government working group has published final guidelines on implementing security in high-performance …
-
U.S. Government Releases New AI Security Guidelines for Critical Infrastructure
The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial intelligence …
-
Essential Online Safety Guidelines for Kids’ Internet Use
The internet can be a very dangerous place for— well, anyone actually. But the risks are particularly pronounced for the most vulnerable …
-
A Note on progress…NIST’s Digital Identity Guidelines.
In August 2023 the Digital Identity Guidelines team hosted a two-day workshop to provide a public update on the status of revision 4. As …
-
CISA, NCSC Offer a Road Map, Not Rules, in New Secure AI Guidelines
US and UK authorities issued new recommendations for companies that build and rely on AI, but they stop short of laying down the …
-
UK Publishes First Guidelines on Safe AI Development
The UK’s National Cyber Security Centre (NCSC) has published what it claims to be the world’s first globally agreed guidelines on safe …
-
CISA and UK NCSC Unveil Joint Guidelines for Secure AI System Development
Today, in a landmark collaboration, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the UK National Cyber Security …
-
What Healthcare Cybersecurity Leaders Should Know About the FDA’s Section 524B Guidelines
…
-
Five Eyes Coalition Release Guidelines for Business Leaders on Securing Intellectual Property
The Five Eyes coalition’s principles focus on reducing the possibility of IP theft, particularly from nation-state-sponsored threat actors. …
-
Five Eyes Release Guidelines for Business Leaders on Securing Intellectual Property
The Five Eyes coalition’s principles focus on reducing the possibility of IP theft, particularly from nation-state-sponsored threat actors. …
●●●