Federal Cybersecurity News and Analysis
News and analysis covering cybersecurity across the U.S. federal government. The increasing digitization of vital information and government services has left key agencies correspondingly vulnerable to data breach by rogue actors and U.S. adversaries. This imperative to safeguard federal IT against malicious intrusion has motivated decision-makers across federal agencies to continue applying breaking cybersecurity methods to core systems.
Connolly is responsible for shaping government-wide policy for a broad range of issues, including federal workforce and agency oversight, procurement and information policy, and more.
The cybersecurity efforts within the overall Optimize NIH initiative are important toward the agency's IT improvements.
A new approach to training service providers is essential to bake cybersecurity into health care.
Security leaders find value in tactics such as cyber escape rooms over traditional training.
Officials from the VA and beyond engage the community for feedback on their most pressing IT issues.
Implementing continuous diagnostics and mitigation requires a holistic approach to integration.
Partnerships and collaborations will be priorities in advancing supply chain security for information and communications tech.
Treating security like a business function encourages agency leads to get involved early on.
Major geopolitical threats target individuals at the focal point of security, experts say.
Jose Arrieta's team is looking at innovative ways to stay ahead of security risks and keep the workforce trained on the newest systems.
A holistic leadership approach is key to driving innovation and managing a diverse workforce.
'What More Can You Do?' is Christopher Krebs’s Motto Going into 2020.
In the past year, agencies have cooperated on national security and security policy
Christopher Krebs advocates for a long-term, actionable plan to support state and local electoral commissions.
Shared services provide cost savings, but are not always the answer.
Endpoint users will always be the weak link in cybersecurity. How do we mitigate the risk?
Some of the agency's challenges include modernization and recruiting top talent to meet cyber needs.
Acquisition CTO discusses developments to improving efficiencies in acquisition through security and technology.
Efficacy testing and trend identification help tackle sources of strategic risk.