Federal Cybersecurity News and Analysis | GovernmentCIO Media & Research

Federal Cybersecurity News and Analysis

News and analysis covering cybersecurity across the U.S. federal government. The increasing digitization of vital information and government services has left key agencies correspondingly vulnerable to data breach by rogue actors and U.S. adversaries. This imperative to safeguard federal IT against malicious intrusion has motivated decision-makers across federal agencies to continue applying breaking cybersecurity methods to core systems.
A new tool is helping the U.S. Immigration and Customs Enforcement address the latest rise in cybercrimes by quickly identifying bad actors before they’re able to majorly disrupt an agency’s infrastructure.
Agencies are aligning security and performance needs.
Ken Myers explains how GSA’s new playbooks are guiding federal agencies’ identity management.
Data standards and governance determine federal agencies's readiness for zero trust.
CIO Kurt DelBene stresses the importance of building the agency's vision and workforce upon the fundamental aspects of zero trust.
New policies are incorporating more flexibility to recruit talented employees.
Join our hosts for an update on evolving federal cyber priorities.
CFPB and DOE shift their attention to zero trust as they work to eliminate risks and build a higher level of protection around their software supply chains.
Protecting data from future threats could see benefits from implementing post-quantum cryptography into agency frameworks.
Reducing technical debt, ensuring zero trust cybersecurity across all connected systems, and developing a strong data foundation will be critical for winning future conflicts.
OMB’s new supply chain memo calls on agencies to utilize software that has been built following common cybersecurity practices.
RPA and AI enables a widespread data fabric to provide cleaner and more secure access to data.
Brian Kelley explains how he’s leveraging new models to secure 5G networks.
SBOMs and transparency are key to resilient cybersecurity models.
Live from Billington Cybersecurity Summit, DOD's CMMC lead explains the new guidelines.
Sherrill steps in as VA's security chief to lead a new cybersecurity approach.
SEC, USPTO and GAO use automation to maximize operations by reducing repeated tasks and optimize workflows.
Good cyber defense comes down to consistent communication and information-sharing.
Key tools within the strategy include software bills of materials and data analytics.
CISA Director Jen Easterly wants to make cyber defense and collaboration 'sexy.'