By any measure software vendor Solar Winds was a high flyer, with many federal customers for its IT managements software. Now the company says it's nearly recovered from the 2020 Sunburst hack that sent federal agencies fleeing...and became part of the cybersecurity vernacular.
The Cybersecurity and Infrastructure Security Agency issued a new emergency directive today saying the vulnerabilities in some VMware products put federal networks and systems at immediate risk.
Lawmakers are skeptical about progress on multifactor authentication, endpoint detection and other capabilities mandated by the cybersecurity executive order.
Malicious actors have found that they can manipulate these digitized systems with the possibility of damaging water infrastructure or even changing the way it’s treated to introduce harmful chemicals.
Former officials call the Energy Department’s decision not to name a political appointee to lead its Office of Cybersecurity, Energy Security and Emergency Response (CESER) a mistake.
As part of the Cybersecurity Maturity Model Certification exercise, DoD will figure out which data under Level 2 will require self-assessments and which will require third-party assessments.
Not everyone feels comfortable driving a Hummer for their morning commute, and most people don’t have to wear combat boots to work. But when it comes to the hardware, software and platforms that keep business safe, shouldn’t companies have the same caliber tools and products that the nation’s most elite cyber teams have?
Hackers spent a year probing companies' networks for weaknesses.
Almost everything is connected to the internet which will expand the number of attack surfaces.
Federal CIO Clare Martorana has been briefing lawmakers about awards and the impact of the Technology Modernization Fund to ensure transparency and accountability.
In today's Federal Newscast, DHS is ready to expand its cyber bug bounty program after a successful pilot.
In today's Federal Newscast, Can the government safely and equitably use facial recognition for identity proofing? That's the question the General Services Administration's Technology Transformation Service is asking.
There’s an unsettling reality that the federal technology community is facing: the SolarWinds and Kaseya breaches could have happened to almost any other company
The armed services need to expend their numbers of high-ranking cybersecurity and cyber warfare officers.
At first blush, it might seem like agency chief data officers would be hampered by the move to a “zero trust” cybersecurity posture.