While there’s no such thing as a silver bullet solution to secure the public sector, continuous pentesting addresses these issues head-on.
DoJ says its policy will encourage independent security and safety research, but will large AI companies follow suit in encouraging vulnerability disclosure?
The new executive assistant director for cybersecurity at CISA details how sharing threat intelligence more broadly pays off.
The IG said CISA made some good improvements to the Automated Indicator Sharing program in recent years.
In the wake of the Change Healthcare ransomware attack, HHS has been expanding its "one-stop shop" for working with the healthcare sector on cyber issues.
The Office of the National Cyber Director wants to fill thousands of open federal jobs under its Service for America initiative.
It’s a case of “haves and have-nots.” Here’s an informal run down of agencies with special cyber pay authorities, including DoD, DHS, and the VA.
Agencies need to break down silos between organizations to monitor the growing volumes of data transiting IT networks, Gigamon’s chief product officer says.
Adversaries seek to gain access to privileged users’ credentials to mimic real users. BeyondTrust and Microsoft experts share ways to counter such attacks.
Cyber adversaries continue to hone their craft. That’s why Google Cloud cyber leader encourages agencies to adapt based on the latest supply chain breaches.
Rep. Nancy Mace (R-S.C.), chairwoman of the Oversight and Accountability Subcommittee on Cybersecurity, IT and Innovation, is asking for a briefing by Oct. 3.
House Homeland Security Committee Chairman Mark Green's cyber workforce bill adds to a growing push to embrace skills-based hiring and training for cyber jobs.
As agencies must juggle multiple cybersecurity directives and workforce shortages, CrowdStrike and Zscaler experts share strategies for pushing forward.
“At the end of the day, our most valuable asset in the government is our data,” GAO Chief Information Officer Beth Killoran said.
Cyberthreats are increasing across all parts of the technology stack, and experts from Okta and Palo Alto Networks discuss tactics for continuous monitoring.