Below are links to 5G, Internet for All, Climate Risks, and Grant Information that have articles, videos and PDF documents that will help you navigate your way through those issues.
This document provides the ever-increasing community of digital businesses a set of Key Practices that any organization can use to manage cybersecurity risks associated with their supply chains. The Key Practices presented in this document can be used to implement a robust C-SCRM function at an organization of any size, scope, and complexity.
(Submitted to the Senate Committee on Commerce, Science, and Transportation House of Representatives Committee on Energy and Commerce on January 10, 2023)
This guide is meant to provide organizations with proactive steps to reduce the likelihood and impact of distributed denial-of-service (DDoS) attacks. These attacks can cost an organization time and money and may impose reputational costs while resources and services are inaccessible
Developed by the ICT Supply Chain Risk Management Task Force, the handbook provides an overview of the highest supply chain risk categories commonly faced by Small and Medium-sized Businesses (SMB), including cyber risks, and contains several use cases that can assist ICT SMBs in identifying the necessary resources to implement ICT supply chain security practices.
This guidance, and the accompanying fact sheet, provides best practices for software customers for procuring and deploying secure software, which includes guidance for the Software Bill of Materials.
Enable your organization to meet the challenges of a changing climate by learning about potential climate hazards so you can protect your vulnerable assets.
The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) published this paper, which assesses the benefits and security considerations with implementing Open RAN architecture.
The Cybersecurity Performance Goals (CPGs) provide voluntary guidance to critical infrastructure partners to help them prioritize security investments toward areas that will have the greatest impact on their cybersecurity. This checklist is to be used in tandem with the CPGs to help prioritize and track your organization's implementation.
This report is focused on software supply chain security in the telecommunications ecosystem with service providers, cloud service providers, and software vendors to identify recommended best practices to improve communications software supply chain security.
The State Climate Summaries provided here were initially produced to meet the demand for state-level climate information in the wake of the Third U.S. National Climate Assessment. This 2022 version provides new information and extends the historical climate record to 2020 for each state.