Cybersecurity | GovernmentCIO Media & Research


Connected capabilities can improve mission activities, but requires the right infrastructure, security and governance.

The Office of Justice Programs leveraged zero trust strategies as a pillar to modernize its grants management system.

Automation has played a key role in helping improve cybersecurity processes, but workforce constraints still hamper efforts.

DOD leaders say you can't have JADC2 without zero trust and a "data-centric" approach to cyber.

The key to successful cybersecurity is "know thyself."

CISO Gregory Edwards provides key considerations for contractors and other federal partners in helping the agency manage the new…

Of the $14.1 billion proposed IRS budget, $798 million will improve the taxpayer experience and $310 million will fund Business…

The agency is looking to implement large-scale information security reforms designed to meet White House goals and counter an…

The budget proposal outlines an increase of over $2.6 billion from last year's enacted level.

Division Assistant Director Bryan Vorndran sees a growing cyber workforce and improved avenues of collaboration as key.

Two quantum computing programs are poised to help government tackle innovations and applications in quantum computing.

CISA encourages all organizations to report immediately and maintain consistent communication until cyber incidents are resolved.

Defense officials described how zero trust, ICAM solutions, DevSecOps and common data standards will optimize JADC2…

The zero trust prototype will attempt to harmonize existing security solutions for a cloud-first environment.

CISA encourages federal agencies to adopt a zero trust approach to cybersecurity to prevent cyberattacks.

The Department of the Army remains focused on identity and mobility within a zero trust environment as employees continue to…

The spending boost and new requirement come as U.S. critical infrastructure sectors prepare for more cyberattacks.

Vendors need to be connected to maintain security between all end points and service providers.

Tackling identity management within a zero trust strategy requires a culture shift.

CISA Director Jen Easterly encouraged critical infrastructure organizations and federal agencies to aggressively shore up cyber…

Organizations should treat zero trust like a mindset rather than as a set of rules or tools.

Tools like software bills of materials can improve software supply chain visibility and security.

Cyber organizations are adopting zero trust and access management solutions to combat new ransomware threats.

Establishing security requirements at the beginning of the software development life cycle is key.

After a pause in the program, the Cybersecurity Maturity Model Certification will now fall under the DOD Office of the Chief…

The initiative will help defense leaders develop more aggressive cyber defenses.

Future iterations of the scorecard could include expanded cybersecurity and infrastructure categories.

Inglis reveals his plan for facilitating more communication between cyber leaders and creating consequences for bad cyber actors.

The service's cyber chief says identity management is key to fulfilling a zero trust strategy.

Zero trust continues to be a major hallmark of cloud security, which includes 5G networks.