A more secure government happens when hackers are stopped before they can touch critical data and systems—when a breach is prevented, not mitigated. With government agencies...
Half of the awards announced publicly went to zero trust cybersecurity projects, with no funding going directly to pandemic response tech. One project remains classified. The...
Advanced persistent threat actors are becoming harder to spot and making attribution more difficult. Advanced persistent threat actors are making it more difficult to attribute cyberattacks...
The inspector general attributed the delays in the agency’s data at rest encryption program to additional mandates and poor adherence to program management best practices. The...
Instead of seeking out short-term gains, agencies need to focus on the long-term benefits. DevSecOps isn’t a technology in and of itself. It’s a process that...
The bills could be attached to the National Defense Authorization Act. Sen. Mark Warner, D-Va., said he may mix aspects of cybersecurity legislation he introduced over the summer—the...
The federal CIO offered a few details of the project proposals received and upcoming award announcements. The Technology Modernization Fund Board has picked seven projects to...
An investigation at US truck maker Navistar has revealed that a data breach on its systems exposed employee healthcare information. Navistar hired external cybersecurity experts and began an...
Taking responsibility for our personal privacy and security is more important than ever, and browser developers continually support these efforts with new and improved privacy and security features....
The Federal Communications Commission is set to vote on tightening its national security reviews of foreign suppliers. The Cybersecurity and Infrastructure Security Agency is urging administrators...
Recent Comments