The FBI, CISA and ODNI formed a group to address the most significant cyber breach of the U.S. government in years.
The Continuous Diagnostics & Mitigation program provides agencies with tools to mitigate cyber threats.
Good data and good relationships with cloud service providers can ensure maximum use of CDM dashboards.
The dashboards are only as good as the data quality and input.
Cloud-based environments and capabilities have been a key part of Maria Roat's approach.
Agencies should include digital tools in all supply chain security strategies amid growing emerging tech.
CISA and a DHS S&T Center of Excellence will develop a nationwide network of cyber institutes for budding cyber professionals.
Leaders discuss execution of cybersecurity is just as important as modernized systems.
Defense acquisition's top official brief next plans of certifying contractors according to new cybersecurity standards.
The agency's CIO is taking on the challenge of roping in disparate legacy networks and systems into one.
Using more automation can help federal agencies improve quality of data.
DHS will be a key leader for IT supply chain security efforts, according to a new report.
The demands of a sudden remote work shift have fostered an integrated approach to cybersecurity.
The last thing federal agencies, especially health agencies, should do is allow their cyber vigilance to slip.
Maintaining best cybersecurity practices while working remotely.
Cybersecurity basics and risk management are key elements of IT supply chain security.
The report calls upon DOD to divest from legacy weapons systems to focus on emerging tech.
Frameworks including zero trust and edge security can vastly improve government cybersecurity.
Federal cybersecurity strategies need to prioritize people.
'Soft skills' are among the top traits for strong cyber leadership, according to federal CISOs.
Federal officials advised agencies to rethink their cybersecurity strategies in terms of data and disinformation.
Senior federal officials urge colleagues to adopt a human-centric approach to security.
A revolution in remote work and internet of things necessitates cybersecurity measures that cover the corresponding risk.
InfoSec, Women in Cyber Leadership, and Cyber Resiliency Panels
Zero trust is more than verifying users, it's also verifying infrastructure.
The COVID-19 pandemic has increased priorities around health information security, crowdsourced penetration testing and…
Resources and talent only go so far if you're not aware of which systems are most vulnerable and still clicking on phishing…
Defense agencies tackled intricate cybersecurity challenges to prepare for remote work.
For many agencies, extended telework policies may require reevaluation of cyber risk posture.
The newly released guidelines aim to uphold government cybersecurity amidst the COVID-19 pandemic.