Indiana CIO Dewand Neely discussed working with constitutional officers, his security maturity/assessment model and proudest accomplishments.
The federal government has avoided major cybersecurity breaches and data theft in recent years. To avoid problems, Ben April of Farsight Security says ‘best practices’ and simply changing passwords remain the best tools we have.
Data storage and maintaining cybersecurity standards are daunting challenges for the Justice Department’s U.S. Attorney’s Office.
In today’s Federal Newscast, federal employees would receive mandatory Internet of Things cybersecurity training under a new bill introduced by Congressman Ro Khanna (D-CA).
In the next stage of CDM, Dimina says, agencies will realize more value from the data they gather, analyzing for threat hunting and active cyber response.
In today’s Federal Newscast, the Commerce Department’s inspector general is running an audit of the bureau’s cybersecurity measures.
The CIA is anything but centralized when it comes to computing. For a closer look at what’s going on, Federal Drive with Tom Temin turned to Bloomberg Government Senior Analyst Robert Levinson.
You’ll find larger numbers of young people working on federal contracts rather than at the awarding agencies.
A new intellectual property policy allows for customized arrangements between DoD and companies.
Cybersecurity awareness programs are not a one and done event, but an area of continuous and universal reinforcement. Laws may be needed to require ransomware incident reporting and perhaps prohibit ransom payment.
In this exclusive executive briefing, cybersecurity professionals tackle the latest thinking in data analytic-driven and threat hunting, to better understand where the government is in cyber and what they see as the main challenges.
Jim Walker from UiPath joins host John Gilroy on this week’s Federal Tech Talk to discuss ways Robotic Process Automation can reduce costs for federal information technology projects.
Dr. John Zangardi, the DHS chief information officer, said he is streamlining the authority to operate (ATO) cyber process to help components move applications to the cloud faster without giving up any of the security rigor required.
Foreign actors are increasingly using those vulnerabilities to advance state policies, causing governments to treat cyber attacks as an extension of armed conflict.