This CISA draft refines the foundational elements of a Software Bill of Materials (SBOM), helping agencies and organizations understand and manage the software components they use. It updates the 2021…
Learn MoreIn modern infantry operations, the real challenge isn’t a Soldier’s strength—it’s the weight they carry. Overloaded packs drain energy, slow movement, and reduce combat effectiveness long before the fight begins.…
Learn MoreAs data privacy regulations grow more stringent, organizations are shifting away from “keep everything” strategies toward smarter, risk-conscious data practices. This guide explores how records retention and data minimization can…
Learn MoreFifteen years after the financial crisis, the 2025 Dodd-Frank report reflects on progress made in building a safer financial system—and where risks still remain. It highlights the importance of capital,…
Learn MoreThe Spring 2025 Semiannual Risk Perspective from the OCC highlights how rising interest rates, commercial real estate exposure, and cybersecurity threats are reshaping risk for national banks and federal savings…
Learn MoreNearly a decade after its passage, the Cybersecurity Information Sharing Act of 2015 continues to play a pivotal role in how cyber threat data is exchanged across federal and nonfederal…
Learn MoreHow do companies respond when hurricanes hit their operations? This study shows that after major hurricane strikes, firms shift capital investment away from affected areas toward safer regions—especially after 1997,…
Learn MoreThe 2025 Cybersecurity Report outlines the growing complexity of cyber threats facing the U.S. financial system, highlighting vulnerabilities linked to third-party service providers and outdated legacy systems. It emphasizes the…
Learn MoreAs cyber threats increasingly target critical infrastructure, state governments are stepping up their cybersecurity readiness. This strategic plan outlines how a multi-state compact can help build capacity, share threat intelligence,…
Learn MoreTo safeguard the integrity of its technology ecosystem, DHS has implemented a comprehensive program to assess supply chain risks related to cybersecurity. This includes open-source research, vendor evaluations, and the…
Learn MoreFederal agencies are warning U.S. organizations—especially in critical infrastructure sectors—about increased cyber threat activity from Iranian-affiliated actors. These actors have been observed exploiting known software vulnerabilities, using default passwords, and…
Learn MoreAmid mounting cybersecurity threats, federal agencies are ramping up efforts to implement Zero Trust security frameworks. This GAO report evaluates how 23 civilian agencies are progressing toward this goal, identifying…
Learn MoreThe Insider Risk Working Group met to discuss the evolving landscape of insider risk management within Federal agencies, the supporting defense industrial base (DIB), and commercial organizations. The discussion explored…
Learn MoreBlockchain is transforming how government agencies approach transparency, efficiency, and security. By enabling real-time tracking of transactions and automating processes like tax collection and benefits distribution, blockchain can help build…
Learn MoreGAO’s latest assessment finds the Department of Defense continues to fall short on delivering advanced weapon systems quickly and cost-effectively. Many programs using acquisition pathways designed for speed instead suffered…
Learn More