CISA | GovernmentCIO Media & Research

CISA

Easterly brings a plethora of offensive cyber and information warfare experience, suggesting a more aggressive cyber focus for the agency.
Cyber vulnerabilities in federal agencies' supply chains aren't going away any time soon, and addressing them will take a consistent, concentrated effort.
Transitioning to 5G is a key strategy for federal agencies' network modernization efforts, but the next generation of communication comes with unique supply chain hazards.
DHS cyber leaders have a laundry list of items for federal CISOs to address.
As cyber crime explodes, cyber experts and federal cyber leaders insist on systemic change.
DHS and CISA want to lead the federal register and private industry by example.
CISA and DOD discussed what the U.S. needs to successfully rollout 5G.
Cybersecurity tools and research are the Critical Infrastructure Resilience Institute's specialty.
Automation tools can support decision-making and should complement the workforce.
Improved information-sharing and basic cyber hygiene are some methods that can prevent major security breaches.
Amid growing cybersecurity concerns, it will take more than legislation to prevent risks in the supply chain.
Cyber officials discussed their priorities and what federal agencies should focus on this year.
The agency provides a look at how the risks with 5G impact supply chain and uncover new vulnerabilities.
Officials from CISA, GSA and NIST say information sharing will be key to managing security risks in the supply chain.
House Republicans are calling for more congressional oversight of IT modernization and cybersecurity.
CISA aims to prevent major supply chain security incidents like the SolarWinds breach from happening again.
Blockchain and 5G are among priorities agencies are exploring for election security and cyber risks.
Amid the SolarWinds breach last year and reliance on strong IT infrastructure in the pandemic response, agencies may receive a big bump in IT funding.
CISA is creating a cohesive cybersecurity approach for federal agencies.
Continuous monitoring of assets on a cloud server amplify security and privacy.