An academic course endorsed by the Defense Department and delivered by accelerator company BMNT aims to help science and engineering students.
DHS cyber lead Iranga Kahangama also says the proposed cyber incident reporting rule is not "simply a land grab," as some criticize it for being overly broad.
Many regulations require that companies working with national security information implement aggressive levels of cybersecurity.
An amendment in the Senate version of 2025 NDAA would "return decision-making power back to DoD components" to purchase cyber products and services.
Cybersecurity becomes almost a personal matter when you're working in a war zone and information superiority is a must.
“My big thing in the last year has been how do I build the J-2? I need people, I need authorities, I need capability, I need funding,” said Col. Richard Leach.
The intelligence community is also pursuing initiatives in cloud computing, data management, zero trust cybersecurity and quantum-resistant encryption.
Not yet in effect, the Cybersecurity Maturity Model Certification program rule is now at the White House for review.
How is the State Department strengthening the cybersecurity workforce?
Where are agencies in their zero trust journey?
How are the CDC and TSA managing cloud adoption to meet their missions?
Guidehouse paid $7.6 million and Nan McKay & Associates paid $3.7 million to resovled claims that they violated the False Claims Act.
What’s next for FedRAMP? What about CISA’s SCuBA? How about secure AI adoption? Where do these efforts interconnect?
The new emerging technology prioritization framework will help determine which generative AI tools need to be pushed to the front of the line for approval.
CTMS hasn’t been the immediate shot in the arm some thought it would be, but DHS’s CIO says it’s a key part of the department’s future.