Federal Cybersecurity News and Analysis
News and analysis covering cybersecurity across the U.S. federal government. The increasing digitization of vital information and government services has left key agencies correspondingly vulnerable to data breach by rogue actors and U.S. adversaries. This imperative to safeguard federal IT against malicious intrusion has motivated decision-makers across federal agencies to continue applying breaking cybersecurity methods to core systems.
CISA's updated guidance provides more technical depth across the five pillars of zero trust and adds a new maturity stage.
Technology leaders across government gathered to discuss top IT modernization priorities during DOL’s Federal Tech Day, which included AI and cybersecurity.
The agency released a ‘roadmap’ to help organizations decrease and confront cyberattacks in health care.
Good cybersecurity strategies rely on sound data management.
Michele Thomas discusses her career in government and what’s ahead in cybersecurity innovation for homeland security.
The Office of the National Cyber Director teased the upcoming cyber workforce strategy.
As the Defense Department implements its zero trust roadmap, data tagging and workforce education are both a challenge and an opportunity.
Defense cyber leaders are honing in on cloud modernization challenges, JWCC and zero trust.
Health and civilian agencies highlighted communication and collaboration when implementing zero trust strategies.
Lynette Sherrill outlines cybersecurity approach amid the growing threat environment.
Cybersecurity, AI and health IT are major focuses in this year's budget proposal.
The new strategy targets DOD's longstanding struggles to recruit and retain top tech talent as cyberspace grows increasingly hostile.
The use of unauthorized technology has become increasingly prevalent in the remote work environment, weakening cybersecurity.
Air Force and CISA programs are securing critical data and IT infrastructures.
The Defense Department’s CMMC program and NIST guidance are helping agencies reap the benefits of hybrid cloud without sacrificing security.
The strategy calls on software developers to assume more responsibility for cyberattacks due to poorly developed code, common to the open-source community.
Health and civilian agencies see major benefits from ICAM solutions, a pillar of zero trust, when protecting IT systems from phishing scams and fraudsters.
On the anniversary of Russia invading Ukraine, military tech leaders are focused on improving communication between the sister services and allied partners without sacrificing cybersecurity.
Agencies are bolstering workforce training and zero trust to secure the hybrid workplace.
The Army's Unified Network Plan and Data Plan are driving zero trust implementation, but workforce training and education are key.