DoD needs to take into account data management and security as it migrates to cloud.
The National Cancer Institute's acting CIO said his first attempt at managed services will be a printing pilot.
Since December suppliers to the Department of Defense have faced new cybersecurity requirements — at least those who know it.
Tim Hurlebaus, president of CGI Federal joins host John Gilroy on this week's Federal Tech Talk to discuss continuous diagnostics and mitigation and steps agencies can take to make a successful transition to the cloud. May 22, 2018
Former federal cyber executives say the NSC’s decision to consolidate the cyber coordinator role sends the wrong signal publicly.
Thomas Jones, a federal systems engineer for Bay Dynamics, makes the case for agencies to define which assets are the most important to the mission.
What can you do to increase your chances of landing a job in the federal government? Find out when Mike Bruni, talent acquisition manager at KeyW Corporation, joins host Derrick Dortch on this week’s Fed Access.
The Pentagon's Joint Task Force Headquarters-DoD Information Network is testing software that aims to detect the telltale signs of a cyber attack as part of a more proactive approach to cyber defense.
Two Democratic lawmakers introduced a bill to establish a cyber adviser and office in the executive branch.
Gigi Schumm welcomes SEC Commisioner Hester Peirce, who is passionate about new company growth and investment, on this week's episode of Women of Washington.
After spending most of their time reacting to cyber attacks, researchers at the Intelligence Advanced Research Projects Activity think they have found a way to predict them.
In today's Federal Newscast, wary of another last-minute budget deal, seven Republican senators asked Majority Leader Mitch McConnell (R-Ky.) to expedite floor consideration of funding bills and nominees before the end of the fiscal year.
The new strategy details seven cybersecurity goals the Homeland Security Department wants to tackle within the next five years.
The adoption of a hybrid cloud model leads agencies down the path of creating an approach to security that is based on the zero trust model, where identity management helps define who has access and how that access is defined to specific data and applications.
In today's Federal Newscast, the Federal Risk Authorization and Management Program and the Cloud Security Alliance announce the creation of FedSTAR to offer mutual recognition between the two security programs.