cybersecurity | GovernmentCIO Media & Research


Agencies across the federal government offer programs to stoke interest in federal cybersecurity careers.
Associate Director for Cybersecurity Jeanette Manfra outlines the three pillars for ICS security.
New tech has a place, but agencies should be mindful of security risks.
How do some of the biggest government agencies continuously monitor fraud or threats and stay ahead of the game?
Agency heads say prioritizing what data to encrypt will prevent further roadblocks to accessibility.
Federal employees from all fields are encouraged to apply before the May 15th deadline.
Commercial practices illuminate a new method for technology development.
Leaders in government and industry iterate importance of cybersecurity in modernizing veteran health care.
Protecting the nation's critical mission systems requires support from everyone involved.
This year's executive plan is all about "action and impact" for IT modernization, according to Federal CIO Suzette Kent.
This year's efforts include new monitoring tools and recruitment strategies.
Advances in cloud computing and mobile data require a new approach to protecting federal networks.
CIO Suzette Kent and others provide updates about recruitment and shared service programs.
Secretary Kirstjen Nielsen says the range of threats is too big for any one organization to fight alone.
As a global shortage of cybersecurity professionals grows, the government looks to expand pool of applicants.
The agency plans ways to incorporate user feedback and security testing throughout the development process.
Representative Will Hurd continues to advocate for federal IT reform, including for AI, cybersecurity and telecommunications, in 116th Congress.
Adoption of a commercial electronic health record will allow for fast adoption of emerging tech at the Defense Health Agency.
Pat Flanders discusses the work DHA is doing behind its electronic health record system and the areas of improvements in recent years.
Floor demonstrations and announcements include a cybersecurity best practices guide, wearable devices and more.