MeriTalk’s Cyber Moments: The Top 5 of 2023!

December 23, 2023
1 min read

From implementing the National Cybersecurity Strategy to issuing broad-sweeping software security guidelines, boosting the nation’s cyber posture was top of mind for the Biden administration in 2023. As we reflect on the past year, here are some of the top 2023 cybersecurity moments – in no particular order – that you should care about as we head into 2024.

The key elements of the article are as follows:

  • The Biden administration released the National Cybersecurity Strategy (NCS) in March 2023, which aims to improve security in critical infrastructure, shift security responsibility onto tech providers, and use all national power to combat cyber attackers.
  • The White House issued the National Cyber Workforce and Education Strategy in July to address cyber job vacancies and increase the number of Americans in good-paying cyber jobs.
  • Chris Inglis stepped down as the national cyber director and was replaced by Kemba Walden in February, who withdrew her nomination in July. Harry Coker was nominated and confirmed as the second permanent national cyber director in August.
  • The Cybersecurity and Infrastructure Security Agency (CISA) published secure-by-design and secure-by-default guidelines in April to improve the safety of technology products.
  • The FITARA Scorecard, released in December, highlighted the need for agencies to show progress in reducing cyber risk, with most agencies receiving a “C” or “D” score.

These moments from 2023 reflect the Biden administration’s focus on improving cybersecurity in critical sectors, addressing the cyber workforce shortage, and promoting secure technology practices. As we move into 2024, it will be important to continue prioritizing cybersecurity to protect the nation’s infrastructure and data from threats.

Latest from Blog

Apache’s OFBiz gets new fix for RCE exploits

TLDR: Apache released a security update for OFBiz to patch vulnerabilities, including a bypass of patches for two exploited flaws. The bypass, tracked as CVE-2024-45195, allows unauthenticated remote attackers to execute code