Federal Cybersecurity News and Analysis | GovernmentCIO Media & Research

Federal Cybersecurity News and Analysis

News and analysis covering cybersecurity across the U.S. federal government. The increasing digitization of vital information and government services has left key agencies correspondingly vulnerable to data breach by rogue actors and U.S. adversaries. This imperative to safeguard federal IT against malicious intrusion has motivated decision-makers across federal agencies to continue applying breaking cybersecurity methods to core systems.
New EHR modernization leads discuss the unified approach driving the program's next steps.
There are underlying biases that impact levels of recruitment ultimately affecting the cybersecurity workforce.
DOL CIO explains how TMF is supporting digitization and data modernization initiatives.
CISA encourages federal agencies to adopt a zero trust approach to cybersecurity to prevent cyberattacks.
Network modernization efforts gain a large amount of momentum after Navy releases Information Superiority Vision document in 2020.
The spending boost and new requirement come as U.S. critical infrastructure sectors prepare for more cyberattacks.
DevSecOps continues to bring change to government's culture and approach to security.
Modeled after DOD's Platform One, a new enterprise-class hosting service is enabling faster development.
Vendors need to be connected to maintain security between all end points and service providers.
The recent executive order has given shape to a broader move across federal agencies away from a reliance on perimeter security.
CISA Director Jen Easterly encouraged critical infrastructure organizations and federal agencies to aggressively shore up cyber defenses as Russia bombards Ukrainian critical infrastructure with malware.
Join our senior researchers for a behind-the-scenes look at current IRS projects.
Organizations should treat zero trust like a mindset rather than as a set of rules or tools.
Tools like software bills of materials can improve software supply chain visibility and security.
Enabling data access, collection and protection can augment manual processes and keep systems secure.
The Department of Labor is taking a close look at principles of its cloud strategy to enable zero trust.
Cyber organizations are adopting zero trust and access management solutions to combat new ransomware threats.
Establishing security requirements at the beginning of the software development life cycle is key.
After a pause in the program, the Cybersecurity Maturity Model Certification will now fall under the DOD Office of the Chief Information Officer.
The initiative will help defense leaders develop more aggressive cyber defenses.