OMB’s new supply chain memo calls on agencies to utilize software that has been built following common cybersecurity practices.
SBOMs and transparency are key to resilient cybersecurity models.
CIO John Sherman highlighted a new upcoming cybersecurity workforce strategy to help its tech talent problem.
Good cyber defense comes down to consistent communication and information-sharing.
CISA Director Jen Easterly wants to make cyber defense and collaboration 'sexy.'
CISA said moving to hybrid cloud also reduces cybersecurity complexity.
CISA’s Robert Costello and Commerce’s Nagesh Rao talk zero trust, standardization and culture change.
Customer-facing services like the CMS provide unique cybersecurity challenges, but the White House's Office of the National Cyber Director is providing new funding assistance.
Concepts and mandates such as cyber incident reporting, DevSecOps and zero trust only go so far.
CISA is working on steps to help federal agencies address potential supply chain vulnerabilities.
We talk about the role of a software bill of materials to enhance security and how you can incorporate one into your organization.
CISA's Shields Up effort is here to stay as federal cyber leaders consider the future of cyber and national security.
Leadership from the FBI, NSA and CISA said information-sharing and stakeholder collaboration inform threat intelligence and national security response.
CISA’s CDM lead wants agencies to harness data and application security within their cybersecurity strategies.
Commander Gen. Glen VanHerck said intelligent automation better protects the homeland by promptly disseminating raw data throughout the world.
Automation has played a key role in helping improve cybersecurity processes, but workforce constraints still hamper efforts.
DHS embraces automation on zero trust journey as they continually make efforts to provide their mission space with the capabilities that they need.
Division Assistant Director Bryan Vorndran sees a growing cyber workforce and improved avenues of collaboration as key.
There are special tools to help organizations protect their infrastructures from malicious Russian cyber activity.