Below are links to Cloud Services, 5G, Internet for All, Climate Risks, and Grant Information that have articles, videos and PDF documents that will help you navigate your way through those issues.
The CSF can help an organization become a smart acquirer and supplier of technology products and services to improve your organizations' Cybersecurity Supply Chain Risk Management (C-SCRM).
This lecture provides an overview of cloud computing, including concepts and best practices for cloud architecture, design, security, and operation.
This lecture provides an overview of cloud computing, including concepts and best practices for cloud architecture, design, security, and operation.
To ensure the safety of your business and your customers' information, the FTC has provided six helpful tips for businesses to follow when using cloud services.
This document divides cloud vulnerabilities into four classes (misconfiguration, poor access control, shared tenancy vulnerabilities, and supply chain vulnerabilities) that encompass the vast majority of known vulnerabilities.
This publication provides an overview of the security and privacy challenges pertinent to public cloud computing. While the document is written with Federal agencies in mind, it also highlights considerations all organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment.
This webpage contains five joint Cybersecurity Information Sheets (CSIs) to provide organizations with recommended best practices and/or mitigations to improve the security of their cloud environment(s).
The ReConnect Loan and Grant Program furnishes loans and grants to provide funds for the costs of construction, improvement, or acquisition of facilities and equipment needed to provide broadband service in eligible rural areas. The application window for the fifth round of funding will open on March 22, 2024
This resource, while aimed at emergency communications practitioners, it can help all communication providers and suppliers familiarize themselves with the impacts of extreme weather on communication systems and improve their response strategies. Some weather events may also produce multiple kinds of extreme conditions, resulting in compounding and concurrent communications concerns.
The Hardware Bill of Materials (HBOM) Framework for Supply Chain Risk Management product provides a framework that includes a consistent naming methodology for attributes of components, a format for identifying and providing information about the different types of components, and guidance of what HBOM information is appropriate depending on the purpose for which the HBOM will be used. The Appendix's "Mapping to SBOM Formats" includes definitions that include a direct 1:1 mapping to alternative BOM formats such as CycloneDX and SPDX.