Cybersecurity
CISA's updated guidance provides more technical depth across the five pillars of zero trust and adds a new maturity stage.
Technology leaders across government gathered to discuss top IT modernization priorities during DOL’s Federal Tech Day, which…
U.S. Army Special Operations Command sees information warfare as a competitive advantage in future conflicts.
Edge computing is vital to the warfighter but securing networks and enabling data access at the network edge remain difficult.
DOD wants more visibility into the commercial cloud service provider side, rather than just the customer side.
The agency released a ‘roadmap’ to help organizations decrease and confront cyberattacks in health care.
Good cybersecurity strategies rely on sound data management.
Michele Thomas discusses her career in government and what’s ahead in cybersecurity innovation for homeland security.
The Office of the National Cyber Director teased the upcoming cyber workforce strategy.
As the Defense Department implements its zero trust roadmap, data tagging and workforce education are both a challenge and an…
Defense cyber leaders are honing in on cloud modernization challenges, JWCC and zero trust.
Health and civilian agencies highlighted communication and collaboration when implementing zero trust strategies.
Lynette Sherrill outlines cybersecurity approach amid the growing threat environment.
Cybersecurity, AI and health IT are major focuses in this year's budget proposal.
The new strategy targets DOD's longstanding struggles to recruit and retain top tech talent as cyberspace grows increasingly…
The use of unauthorized technology has become increasingly prevalent in the remote work environment, weakening cybersecurity.
Air Force and CISA programs are securing critical data and IT infrastructures.
The Defense Department’s CMMC program and NIST guidance are helping agencies reap the benefits of hybrid cloud without…
The strategy calls on software developers to assume more responsibility for cyberattacks due to poorly developed code, common to…
Health and civilian agencies see major benefits from ICAM solutions, a pillar of zero trust, when protecting IT systems from…
On the anniversary of Russia invading Ukraine, military tech leaders are focused on improving communication between the sister…
Former HHS OIG CIO Gerald Caron takes on a new role as ITA CIO.
Agencies are bolstering workforce training and zero trust to secure the hybrid workplace.
The Army's Unified Network Plan and Data Plan are driving zero trust implementation, but workforce training and education…
Partnerships are crucial enablers for helping the Defense Department counter growing threats.
Cultural and technical agility underpins the Air Force's new zero trust roadmap amid Defense Department zero trust…
CISA's Joint Cyber Defense Collaborative will focus on managing and preventing persistent cybersecurity threats, such as…
The Navy’s tech strategy centers on modern approaches to unlocking data’s potential.
CIO Aaron Weis' take on a continuous ATO process includes moving to a currency mindset.
NIST is standardizing quantum-proof encryption algorithms to help federal agencies protect against quantum-based attacks.