Security | GovernmentCIO Media & Research

Security

Resources and talent only go so far if you're not aware of which systems are most vulnerable and still clicking on phishing emails.
Defense agencies tackled intricate cybersecurity challenges to prepare for remote work.
For many agencies, extended telework policies may require reevaluation of cyber risk posture.
Agencies passed FITARA 10.0 largely due to software licensing, Agile development and data center consolidation initiatives.
George Washington University's program will focus on transitioning security technology prototypes to usable products.
The Science & Technology Directorate sees improvements for quickly approving mobile apps for government use.
As agencies increase connectivity capabilities, they also increase their cyber risk.
Following major cyber incidents, cybersecurity experts push for CISA support and a National Cyber Director.
As government agencies go digital, increased cyber risks require a holistic approach.
Congressional representatives say the position would be the best way for the U.S. to prevent and address cyber incidents efficiently.
CISA and NSA provide guidance for how federal agencies can address critical vulnerabilities in their networks.
CISO Wanda Jones-Heath says thinking about the service on an enterprise level will spur efficiency and innovation across DOD.
With phishing and the upcoming election, securing infrastructure remains a top necessity that initiatives like TIC 3.0 will advance.
The agency is training its workforce and collaborating with partners to protect information.
The agency has implemented flexible technological capabilities to support ongoing COVID-19 response efforts.
National security efforts include means to protect and coordinate with the nation's first responders.
Federal IT leads say the strategy lets agencies ‘use the tools we have’ to modernize security.
Though some regulatory procedures have been impacted, accreditation board is already working with industry.
Identity-based approach to verification moves beyond perimeters and VPNs.
Overhauling how government communicates remotely doesn't have to affect security.