Federal Cybersecurity News and Analysis
News and analysis covering cybersecurity across the U.S. federal government. The increasing digitization of vital information and government services has left key agencies correspondingly vulnerable to data breach by rogue actors and U.S. adversaries. This imperative to safeguard federal IT against malicious intrusion has motivated decision-makers across federal agencies to continue applying breaking cybersecurity methods to core systems.
Federal agencies have refined their cybersecurity practices to adapt to both newfound threats and the broad shift to remote work.
The Air Force and NSA veteran is charged with implementation of Biden's recent cyber executive order.
The GAO's IT and cybersecurity lead discusses President Biden's cyber executive order.
Transitioning to 5G is a key strategy for federal agencies' network modernization efforts, but the next generation of communication comes with unique supply chain hazards.
Cybersecurity leaders discuss how the agency is implementing new cyber controls to protect medical device integrity.
DHS cyber leaders have a laundry list of items for federal CISOs to address.
Agency CTOs highlighted the areas they're working on to improve IT across the department.
Greater supply chain transparency and information-sharing will improve federal cyber posture.
As cyber crime explodes, cyber experts and federal cyber leaders insist on systemic change.
DHS and CISA want to lead the federal register and private industry by example.
USDA and VA are modernizing IT systems to prepare for the digital future.
DHS is working to secure supply chains and leverage new standardization to protect IT networks.
The Cyber Crime Center outlines how cyber criminals are using the dark web to commit pandemic-related scams.
CISA and DOD discussed what the U.S. needs to successfully rollout 5G.
Federal CISOs discuss mitigation strategies for inevitable cyber attacks.
An Atlantic Council leader advocates for greater empowerment of the CISO role.
Federal cybersecurity experts emphasize the importance of capabilities like zero trust to prevent future breaches.