The 2023 National Cybersecurity Strategy is a momentous document that will have a lasting influence on the global digital ecosystem. One aspect of the strategy’s intent is to “reimagine cyberspace” as a tool to improve trust in the United States’ democratic institutions.
No one can predict when disaster will occur. But organizations, whether government or private, can control how well they respond. It is all about risk mitigation and resilience.
CISA has hired about 80 people through the "cyber talent management system," while FEMA is also about to start using CTMS.
22 of the 37 items on GAO’s list of vulnerable federal programs and broad government challenges stem from issues of mission-critical skills gaps in the federal workforce.
CBP is already moving forward with an effort to embed AI algorithms in screening technology, while CISA's director has raised concerns about the "weaponization" of tech.
Iranian hackers broke into to a system used by a U.S. municipal government to publish election results in 2020 but were discovered by cyber soldiers operating abroad and kicked out before an attack could be launched, according to U.S. military and cybersecurity officials. The system involved in the previously undisclosed breach was not for casting or counting ballots, but rather one that was used to report unofficial election results on a public website. The breach was revealed during a presentation Monday at the RSA Conference in San Francisco, which is focused on cybersecurity. Officials did not identify the municipality targeted.
IARPA's program manager explains how she hopes the research agency can make "human factors" a weakness of cyber attackers, too.
DoD will not be able to afford a fragmented security posture; its cyber analysts and defenders will need visibility across the entire cloud landscape, rather than having to swivel between separate instances. DoD will need a common picture of user identities, a common means of putting policy and protection onto endpoints, and a common defensive layer.
Understanding the value of compliance data science and using process debt as a cost figure, agencies will overcome resistance to change and improve the efficiency of their operations.
Companies and critical national infrastructure organizations at risk of cyberattack now need to take best practices from the military’s approach to training and readiness and apply the Cyber Flag construct to protect their critical assets.
Clare Martorana, the federal chief information officer chairwoman of the Technology Modernization Fund Board, and Raylene Yung, the executive director of the Technology Modernization Fund, say they are giving lawmakers more details and briefings about the progress and impact of the investments.
16 of the 37 federal programs and governmentwide challenges on GAO’s 2023 high risk list improved, according to the latest biennial report the agency published Thursday.
Lots of things have days, like National Ice Cream Day. Lots of things have whole months, like USDA Invasive Plant Pest Month. So why not emergency communications? Emergency Communications Month is in fact going on right now.
After 21-year-old Jack Teixeira was arrested for allegedly leaking classified info, the Pentagon is looking at what it can do to prevent similar situations in the future.
During this exclusive webinar, you will learn how top government technology executives are implementing effective strategies and technology around zero trust.