The 2024 National Drug Threat Assessment (NDTA) highlights the dangerous shift from plant-based drugs to synthetic drugs. This annual assessment provides law enforcement agencies, policy makers, and prevention and treatment…
Learn MoreManaging government Property, Plant, and Equipment systems is a time-consuming task. It usually means dealing with multiple spreadsheets, disparate data, and piles of paperwork. The challenge grows with the strict…
Learn MorePhobos is structured as a ransomware-as-a-service model. These incidents targeted municipal and county governments, emergency services, education, public healthcare, and other critical infrastructure entities to successfully ransom several million U.S.…
Learn MoreThe Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency, Department of Health and Human Services , and Multi-State Information Sharing and Analysis Center are releasing this joint Cybersecurity…
Learn MoreQuantum computing will disrupt major industries sooner than you think. Organizations across the globe are currently stepping up their investment in this technology to remain competitive and to ensure their…
Learn MoreThe Federal Government has broad exposure to the physical risks of climate change and the transition risks associated with the global shift away from carbon-intensive energy sources. At the same…
Learn MorePresident Biden’s October 2023 executive order prioritizes the governance of artificial intelligence in the federal government, prompting the urgent creation of AI risk management standards and procurement guidelines. Soon after…
Learn MoreRegScale overcomes limitations in legacy GRC by bridging security, risk, and compliance through their Continuous Controls Monitoring platform. Their CCM pipelines of automation, dashboards, and AI tools deliver lower program…
Learn MoreThe Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint distributed denial-of-service (DDoS) attack…
Learn MoreOn March 13, 2024, the House of Representatives passed the Protecting Americans from Foreign Adversary Controlled Applications Act (H.R. 7521). If enacted, H.R. 7521 would make it unlawful to provide…
Learn MoreThe complex and dynamic processes involved in the development, deployment, use, and maintenance of AI technologies benefit from careful management throughout the medical product life cycle. Specifically, end-to-end management of…
Learn MoreWildfires across the U.S. and around the world are becoming more frequent, costly, and dangerous. The Department of Homeland Security Science and Technology Directorate is working with the U.S. Fire…
Learn MoreAs the authoring agencies have previously highlighted, the use of living off the land (LOTL) techniques is a hallmark of Volt Typhoon actors’ malicious cyber activity when targeting critical infrastructure.…
Learn MoreThe purpose of this publication is to provide organizations with guidance on how to use AI systems securely. The paper summarizes some important threats related to AI systems and prompts…
Learn MoreThe space sector is transitioning towards Hybrid Satellite Networks (HSN), an aggregation of independently owned and operated terminals, antennas, satellites, payloads, or other components that comprise a satellite system. The…
Learn More