First the National Risk Management Center, now the Cybersecurity and Infrastructure Security Agency.
Haiyan Song was named one of the top 50 most powerful women in tech in 2016 and 2017.
“Your risk of being attack isn’t a 9 to 5 thing,” says Threat Researcher Nick Biasini.
Helping agencies understand FedRAMP.
The threats looming in orbit, and the tech needed to thwart them.
It's a game-changing technology, but a locus for cyberattacks.
To make breakthroughs, it has to be adaptive and agile.
How a fake critical infrastructure network shed light on real live cyberthreats.
Another step toward going green.
'Just Fix the Bug, and Nobody Will Get Hurt:' HackerOne’s Mårten Mickos on Bug Bounties and Their Place in Government
Because everyone will be hacked — eventually.
And the methods used typically aren't that sophisticated.
It could play a key role in mitigating bad behavior.
DOJ and civil liberties community don't yet see eye-to-eye on these issues.
Fatigue and frustration magnify the strain.
A whack-a-mole approach doesn't work anymore.
Let's not have machines make life or death decisions, shall we?
And is setting the standards for protecting U.S. critical infrastructure.
“We must move beyond routine information sharing,” said Secretary Kirstjen Nielsen.
Why not turn to the crowd for some ideas?
The role has been vacant for 18 months.
"We need to recognize, especially in cyber, that we accept risk every day."
The first CyberCast episode explores how cyber relies on proper risk management.
Discussing a renewed focus on risk management.
We made a list of the top priorities, in case he needs one.
Cross-sector bidirectional information sharing will help DHS address critical infrastructure risk.
DOD's Acting Principal Deputy CIO for Cybersecurity Thomas Michelli lays out the department’s cyberpriorities and how…
With midterms quickly approaching, DHS launches coalitions, task forces and governmentwide initiatives to thwart another Russian…
Former first federal CISO explains the state of cyber in government, says we’re still 9 years behind schedule.
But at times, the urgency to detecting threats is too great to wait, and machine learning algorithms are the answer.