
Below are links to 5G, Internet for All, Climate Risks, and Grant Information that have articles, videos and PDF documents that will help you navigate your way through those issues.
This document is a one-stop resource to help organizations reduce the risk of ransomware incidents through best practices to detect, prevent, respond, and recover, including step-by-step approaches to address potential attacks. This publication was developed through the Joint Ransomware Task Force (JRTF), an interagency body established by Congress in the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) to ensure unity of effort in combating the growing threat of ransomware attacks.
This document provides the ever-increasing community of digital businesses a set of Key Practices that any organization can use to manage cybersecurity risks associated with their supply chains. The Key Practices presented in this document can be used to implement a robust C-SCRM function at an organization of any size, scope, and complexity.
(Submitted to the Senate Committee on Commerce, Science, and Transportation House of Representatives Committee on Energy and Commerce on January 10, 2023)
This guide is meant to provide organizations with proactive steps to reduce the likelihood and impact of distributed denial-of-service (DDoS) attacks. These attacks can cost an organization time and money and may impose reputational costs while resources and services are inaccessible
Developed by the ICT Supply Chain Risk Management Task Force, the handbook and this fact sheet provide an overview of the highest supply chain risk categories commonly faced by Small and Medium-sized Businesses (SMB), including cyber risks, and contains several use cases that can assist ICT SMBs in identifying the necessary resources to implement ICT supply chain security practices.
This guidance, and the accompanying fact sheet, provides best practices for software customers for procuring and deploying secure software, which includes guidance for the Software Bill of Materials.
Enable your organization to meet the challenges of a changing climate by learning about potential climate hazards so you can protect your vulnerable assets.
The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) published this paper, which assesses the benefits and security considerations with implementing Open RAN architecture.
The Cybersecurity Performance Goals (CPGs) provide voluntary guidance to critical infrastructure partners to help them prioritize security investments toward areas that will have the greatest impact on their cybersecurity. This checklist is to be used in tandem with the CPGs to help prioritize and track your organization's implementation.