Learn how to overcome the major pain points of federal IT modernization and march toward cloud, mobility and zero-trust security powered by trusted access solutions.
The organization's election security role is expanding as cybersecurity threats evolve.
Members of Congress pressed Treasury Secretary Steven Mnuchin about how effective the department's cyber-related financial sanctions were in deterring future behavior and how it was defining success.
China spent the year targeting telecommunications infrastructure to feed its spying and IP theft, while Iran shifted to target defense contractors in the latter half of the year.
The document offers non-binding legal guidance for how to navigate cyber intelligence gathering on the Internet, particularly for sites that advertise illegal services.
Assessments look to measure cognitive and interpersonal competencies as well as technical ability.
The lead general for TRANSCOM threw support behind the Defense Department's impending unified cybersecurity standard for contractors, the Cybersecurity Maturity Model Certification, as contractors struggle with advanced persistent threats.
The director of the Cybersecurity and Infrastructure Security Agency said the organization has been “a little bit late to the game” recognizing the potential of ransomware to directly touch the lives of citizens, but that’s changing.
The Federal Retirement Thrift Investment Board still has not "fully developed and implemented an effective, organization-wide information security program."
A significant reduction in the backlog of security clearance investigations over the past two years has contractors feeling more optimistic, but concerns about lengthy adjudications and reciprocity between federal agencies still linger.
A new report lays out where FedRAMP has gone wrong – and what can be done to fix it.
Commentators on the new Trusted Internet Connection policy have noted that "zero-trust" strategies might not be a perfect fit.
The Navy has realigned cyber spending into a new category that includes the Joint Regional Security Stacks program.
Acting Deputy TSA Administrator Patricia Cogswell said that as screening tech has improved, insider threats have become an increasingly attractive attack vector for bad actors.
Micro-credentialing and new data projects are being used to reward airmen, the Air Force's deputy CIO says.
The independent agency would be charged with coordinating federal policy on privacy, process complaints from consumers and launch investigations and audits.?
Sign up for our newsletter.
To serve government buyers, a provider must balance between commercial efficiency and public accountability.
Martha Dorris offers 10 predictions for how agencies will improve CX this year.
A Commission on Privacy and Data should be created to develop legislation, taking the EU's General Data Protection Regulation and the California Consumer Privacy Act as a starting point to extend protections to individuals regarding data and privacy.
More Opinion that Matters