Cybersecurity | GovernmentCIO Media & Research


And the methods used typically aren't that sophisticated.

It could play a key role in mitigating bad behavior.

DOJ and civil liberties community don't yet see eye-to-eye on these issues.

Let's not have machines make life or death decisions, shall we?

And is setting the standards for protecting U.S. critical infrastructure.

“We must move beyond routine information sharing,” said Secretary Kirstjen Nielsen.

"We need to recognize, especially in cyber, that we accept risk every day."

The first CyberCast episode explores how cyber relies on proper risk management.

Discussing a renewed focus on risk management.

We made a list of the top priorities, in case he needs one.

Cross-sector bidirectional information sharing will help DHS address critical infrastructure risk.

DOD's Acting Principal Deputy CIO for Cybersecurity Thomas Michelli lays out the department’s cyberpriorities and how…

With midterms quickly approaching, DHS launches coalitions, task forces and governmentwide initiatives to thwart another Russian…

Former first federal CISO explains the state of cyber in government, says we’re still 9 years behind schedule.

But at times, the urgency to detecting threats is too great to wait, and machine learning algorithms are the answer.

The technology holds the promise of making information more secure and more sharable while giving patients more control over it.

DHS is looking past information sharing to a complete cross-sector shared critical warning system for cyberthreat indicators.

Strategy and culture are key to the Education Department’s holistic approach to cybersecurity.

A mix of sensors and AI, networks or buildings could soon know who you are without you having to tell them.

Govies show the riskiest behavior in social media use, physical security and mobile computing.

And if you think a compliance checklist means your system is secure, you’re wrong.

These days, just about anybody can have the digital equivalent of nukes.

Public-private partnerships crucial to countering digital attacks.