Cybersecurity
A top Ukrainian intelligence official on the front lines of the cyber war with Russia describes the threat to critical…
Industry and federal partners are working on collaborations to transform the evolving cybersecurity landscape.
The agency’s deputy CISO breaks down some of the tools he’s prioritizing amid evolving security threats.
With the release of the National Cyber Workforce and Education Strategy, the administration and its partners aim to build…
"On this battlefield, the most decisive commodity for improved sustainment is data," Maj. Gen. Mark Simerly said.
The plan is the latest in a series of directives that outline cybersecurity initiatives and responsibilities across 18 federal…
A new memo outlines the key areas federal agencies will need to prioritize from the National Cybersecurity Strategy.
The agency’s intelligence and law enforcement capabilities are keeping pace with technological change to respond to and prevent…
The strategy, evaluation and analytics that reinforce application security features and defend against evolving threats.
The House and Senate armed services committees approved versions that would impact defense network security, innovation and the…
The White House released a memo outlining five cybersecurity areas federal agencies will need to prioritize as they make their…
The agency and its allies engaged in an exercise to demonstrate their defensive operations and improve cyber defenses in the U.S.
The list is a priority for organizations working to prevent cyberattacks in a heightened threat environment.
Cyber experts say Chinese hackers will likely target U.S. critical infrastructure as part of Taiwanese war plans.
The COVID-19 pandemic accelerated data sharing between federal health agencies, highlighting the need for stronger cybersecurity…
CISO Lynette Sherrill outlines how the agency is using a zero trust mindset at the heart of the agency's cybersecurity…
Outgoing Air Force CIO Lauren Knausenberger reflects on the impacts she has made at the service and what’s next.
CISA's updated guidance provides more technical depth across the five pillars of zero trust and adds a new maturity stage.
Technology leaders across government gathered to discuss top IT modernization priorities during DOL’s Federal Tech Day, which…
U.S. Army Special Operations Command sees information warfare as a competitive advantage in future conflicts.
Edge computing is vital to the warfighter but securing networks and enabling data access at the network edge remain difficult.
DOD wants more visibility into the commercial cloud service provider side, rather than just the customer side.
The agency released a ‘roadmap’ to help organizations decrease and confront cyberattacks in health care.
Michele Thomas discusses her career in government and what’s ahead in cybersecurity innovation for homeland security.
The Office of the National Cyber Director teased the upcoming cyber workforce strategy.
As the Defense Department implements its zero trust roadmap, data tagging and workforce education are both a challenge and an…
Defense cyber leaders are honing in on cloud modernization challenges, JWCC and zero trust.
Health and civilian agencies highlighted communication and collaboration when implementing zero trust strategies.
Lynette Sherrill outlines cybersecurity approach amid the growing threat environment.