The cybersecurity resources gap is no longer a problem we can solve with humans alone. Though the cybersecurity “skills gap” should be an issue of the...
Container technology allows operability across operating systems and faster development but is a primary security concern for implementers. The General Services Administration is giving cloud service...
Gen. Paul Nakasone, who oversees both the intelligence agency and U.S. Cyber Command, stressed the need for greater visibility through private-sector information streams. Gen. Paul Nakasone...
The Energy Department has been focused on securing the generation and transmission of power, but distribution processes are also increasingly vulnerable. The Energy Department is collaborating...
The White House is leading an interagency effort focused on software development that will determine federal procurement of information technology. The government is just weeks out...
Smart threat intelligence starts with good data. In the near future, artificial intelligence-driven cyber operations will play an outsized role in how the federal government protects...
A newly published report form the U.S. Government Accountability Office (GAO) describes the risks of cyber-attacks on the electricity grid’s distribution systems, along with the scale...
China will soon harness AI to supplant Russia as the world leader in information warfare, a DIA leader said. The U.S. military isn’t keeping up with...
The experts say the sorts of rudimentary vulnerabilities revealed in the breach are common among America’s 151,000 public water systems. On Feb. 16, less than two...
The commission is also seeking public comment on the development of Open Radio Access Networks to improve national security and prosperity. The Federal Communications Commission initiated...
Recent Comments