An emphasis on cybersecurity boosts DHS from a D-minus to B FITARA score in half a year.
IT leaders recommend identifying use cases to apply the technology.
HHS is making strides in innovating its cybersecurity posture through its approach to recurrent neural networks and beyond.
The health agency is prioritizing these areas amid the many technological solutions DHA seeks.
'Aptitude' is among government's top focus for potential recruits.
Connolly is responsible for shaping government-wide policy for a broad range of issues, including federal workforce and agency…
The cybersecurity efforts within the overall Optimize NIH initiative are important toward the agency's IT improvements.
A new approach to training service providers is essential to bake cybersecurity into health care.
Security leaders find value in tactics such as cyber escape rooms over traditional training.
Officials from the VA and beyond engage the community for feedback on their most pressing IT issues.
How the nation's largest health care provider manages security.
Implementing continuous diagnostics and mitigation requires a holistic approach to integration.
Partnerships and collaborations will be priorities in advancing supply chain security for information and communications tech.
Treating security like a business function encourages agency leads to get involved early on.
Lawmakers discuss opportunities for the federal government to compete with industry for top talent.
Major geopolitical threats target individuals at the focal point of security, experts say.
Jose Arrieta's team is looking at innovative ways to stay ahead of security risks and keep the workforce trained on the…
The FBI must strategize its IT modernization efforts while balancing crucial security responsibilities.
A holistic leadership approach is key to driving innovation and managing a diverse workforce.
'What More Can You Do?' is Christopher Krebs’s Motto Going into 2020.
In the past year, agencies have cooperated on national security and security policy
Christopher Krebs advocates for a long-term, actionable plan to support state and local electoral commissions.
The first update to the policy in 12 years will enable further IT transformation.
Shared services provide cost savings, but are not always the answer.
Endpoint users will always be the weak link in cybersecurity. How do we mitigate the risk?
Some of the agency's challenges include modernization and recruiting top talent to meet cyber needs.
Acquisition CTO discusses developments to improving efficiencies in acquisition through security and technology.
Efficacy testing and trend identification help tackle sources of strategic risk.
TSA is looking to move beyond traditional security screening methods to increase efficiency and decrease wait times.
The 25 graduates developed cyber defense analysis skills in just three months.