FSAFEDS enrollees will also soon have to transition to Login.gov and complete an identity verification to continue accessing their accounts.
Human resources applications, which touch everyone in the agency, provide a great use case for getting good with cloud, AI and software-as-a-service.
The cloud security program launched two programs, an agile delivery pilot and a new technical documentation hub, to accelerate cloud authorizations.
An academic course endorsed by the Defense Department and delivered by accelerator company BMNT aims to help science and engineering students.
DHS cyber lead Iranga Kahangama also says the proposed cyber incident reporting rule is not "simply a land grab," as some criticize it for being overly broad.
Many regulations require that companies working with national security information implement aggressive levels of cybersecurity.
An amendment in the Senate version of 2025 NDAA would "return decision-making power back to DoD components" to purchase cyber products and services.
Cybersecurity becomes almost a personal matter when you're working in a war zone and information superiority is a must.
“My big thing in the last year has been how do I build the J-2? I need people, I need authorities, I need capability, I need funding,” said Col. Richard Leach.
The intelligence community is also pursuing initiatives in cloud computing, data management, zero trust cybersecurity and quantum-resistant encryption.
Not yet in effect, the Cybersecurity Maturity Model Certification program rule is now at the White House for review.
How is the State Department strengthening the cybersecurity workforce?
Where are agencies in their zero trust journey?
How are the CDC and TSA managing cloud adoption to meet their missions?
Guidehouse paid $7.6 million and Nan McKay & Associates paid $3.7 million to resovled claims that they violated the False Claims Act.