<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CISA Archives - Bridgehead Security</title>
	<atom:link href="https://bridgeheadsecurity.com/tag/cisa/feed/" rel="self" type="application/rss+xml" />
	<link>https://bridgeheadsecurity.com/tag/cisa/</link>
	<description>Security For The Energy Industry</description>
	<lastBuildDate>Sat, 26 Apr 2025 02:30:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://bridgeheadsecurity.com/wp-content/uploads/2024/10/cropped-Bridge-only-32x32.png</url>
	<title>CISA Archives - Bridgehead Security</title>
	<link>https://bridgeheadsecurity.com/tag/cisa/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Salt Typhoon and You</title>
		<link>https://bridgeheadsecurity.com/2024/12/19/salt-typhoon-and-you/</link>
		
		<dc:creator><![CDATA[Ross Johnson]]></dc:creator>
		<pubDate>Thu, 19 Dec 2024 17:20:05 +0000</pubDate>
				<category><![CDATA[Communications Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Physical Security]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[communications security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[information protection]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<guid isPermaLink="false">https://bridgeheadsecurity.com/?p=578</guid>

					<description><![CDATA[<p>The US Cybersecurity and Infrastructure Security Agency (CISA) has issued guidance on a recent hack by the Chinese Advanced Persistent Threat group called Salt Typhoon, and as it deals with communications methods we all use every day, we should pay attention to it. The document is called &#8220;Mobile Communications Best Practice Guidance&#8221; and it is [&#8230;]</p>
<p>The post <a href="https://bridgeheadsecurity.com/2024/12/19/salt-typhoon-and-you/">Salt Typhoon and You</a> appeared first on <a href="https://bridgeheadsecurity.com">Bridgehead Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The US <strong>Cybersecurity and Infrastructure Security Agency (CISA)</strong> has issued guidance on a recent hack by the Chinese Advanced Persistent Threat group called Salt Typhoon, and as it deals with communications methods we all use every day, we should pay attention to it.<br><br>The document is called &#8220;<strong>Mobile Communications Best Practice Guidance</strong>&#8221; and it is available online here: <a href="https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf">https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf</a><br><br>The guidance also includes advice specific to iPhone and to Android phones.<br><br>The simplest version of the advice is this: if the information is sensitive, don&#8217;t use cellular voice or SMS, as they are both unencrypted.  You need end-to-end encryption, which you will get with the iPhone iMessage, Meta&#8217;s WhatsApp, and Signal.<br><br>I strongly urge you to go to the CISA link (above) and read the guidance they provide.</p>



<p></p>
<p>The post <a href="https://bridgeheadsecurity.com/2024/12/19/salt-typhoon-and-you/">Salt Typhoon and You</a> appeared first on <a href="https://bridgeheadsecurity.com">Bridgehead Security</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
