China’s rise continues to present tremendous strategic challenges and opportunities for the United States and its allies and partners. Today, Beijing aims to connect the majority of the world’s population under the Belt and Road Initiative, dominate high-tech industry, and forge a world-class military. Despite the sustained, structural momentum behind China’s growth, increasing economic uncertainty, paired with long-term demographic challenges and tightening domestic political control, ...| Atlantic Council
In cyberspace, adversaries are growing more sophisticated and outpacing advancements in policy, education, and defense technologies. In an era of great-power competition, it is vital that policy makers and tech experts understand the underlying factors and motivations impacting the field of cybersecurity. With a focus on strategy and foresight, the Atlantic Council shifts attention from singular incidents to better understand larger cyber campaigns.| Atlantic Council
CISA's CVD program coordinates the remediation and public disclosure of newly identified cybersecurity vulnerabilities in products and services with the affected vendor(s). This includes new vulnerabilities in industrial control systems (ICS), Internet of Things (IoT), and medical devices, as well as traditional information technology (IT) vulnerabilities. The goal of CISA's CVD program is to ensure that CISA, the affected vendor(s) and/or service provider(s), and the vulnerability reporter a...| Cybersecurity and Infrastructure Security Agency CISA
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.How to use the KEV CatalogThe KEV catalog is also available in these formats:| Cybersecurity and Infrastructure Security Agency CISA