Federal Cybersecurity News and Analysis
News and analysis covering cybersecurity across the U.S. federal government. The increasing digitization of vital information and government services has left key agencies correspondingly vulnerable to data breach by rogue actors and U.S. adversaries. This imperative to safeguard federal IT against malicious intrusion has motivated decision-makers across federal agencies to continue applying breaking cybersecurity methods to core systems.
Continuous monitoring of assets on a cloud server amplify security and privacy.
The two security methods can enhance overall cybersecurity protocols.
Leaders look to newer focuses in securing their ICT supply chains.
The FBI, CISA and ODNI formed a group to address the most significant cyber breach of the U.S. government in years.
The Continuous Diagnostics & Mitigation program provides agencies with tools to mitigate cyber threats.
Good data and good relationships with cloud service providers can ensure maximum use of CDM dashboards.
The dashboards are only as good as the data quality and input.
Cloud-based environments and capabilities have been a key part of Maria Roat's approach.
Agencies should include digital tools in all supply chain security strategies amid growing emerging tech.
CISA and a DHS S&T Center of Excellence will develop a nationwide network of cyber institutes for budding cyber professionals.
Leaders discuss execution of cybersecurity is just as important as modernized systems.
Defense acquisition's top official brief next plans of certifying contractors according to new cybersecurity standards.
The agency's CIO is taking on the challenge of roping in disparate legacy networks and systems into one.
Using more automation can help federal agencies improve quality of data.
DHS will be a key leader for IT supply chain security efforts, according to a new report.
The demands of a sudden remote work shift have fostered an integrated approach to cybersecurity.
The last thing federal agencies, especially health agencies, should do is allow their cyber vigilance to slip.
Maintaining best cybersecurity practices while working remotely.
Cybersecurity basics and risk management are key elements of IT supply chain security.