The cybersecurity resources gap is no longer a problem we can solve with humans alone. Though the cybersecurity “skills gap” should be an issue of the...
Container technology allows operability across operating systems and faster development but is a primary security concern for implementers. The General Services Administration is giving cloud service...
Gen. Paul Nakasone, who oversees both the intelligence agency and U.S. Cyber Command, stressed the need for greater visibility through private-sector information streams. Gen. Paul Nakasone...
The Energy Department has been focused on securing the generation and transmission of power, but distribution processes are also increasingly vulnerable. The Energy Department is collaborating...
Microsoft has launched a bug bounty program for 365 applications, with Microsoft Teams’ desktop client the sole in-scope target for now. Announced yesterday (March 24), the Microsoft Applications Bounty...
Security researchers have harnessed the novel ‘H2C smuggling’ technique to achieve authentication, routing, and WAF bypasses on a number of leading cloud platforms. The attack’s first...
The White House is leading an interagency effort focused on software development that will determine federal procurement of information technology. The government is just weeks out...
The Office of American Innovation, Cloud Smart and the Federal Reskilling Academy are some of Trump-era tech policies left behind. Now the Biden team must decide...
DISA’s program director for the enterprisewide collaboration tools contract said the agency is creating a guide for other components to ease migration, including navigating security levels....
Smart threat intelligence starts with good data. In the near future, artificial intelligence-driven cyber operations will play an outsized role in how the federal government protects...
Recent Comments