Last month, the European Commission drafted a law called the Cyber Resilience Act. It's an extensive framework aimed at improving cybersecurity in the EU.
The minimum security configurations should help agencies better secure widely used business applications.
One way federal agencies can keep their systems current is to use digital twins for security modeling. Let’s look at this practice and why it’s gaining popularity as the preferred way to patch mission-critical systems and maintain software integrity.
The federal chief information security officer says the zero trust strategy is helping cyber leaders make the case for specific investments in the 2024 budget.
The National Cybersecurity Center of Excellence, part of the National Institute of Standards and Technology is planning a healthcare project to establish best practices for security and privacy in telehealth situations.
Gharun Lacy, the deputy assistant secretary and assistant director for cyber and technology security at the Foreign Affairs Cybersecurity Center at the State Department, said reducing the time between alert and response is their main focus.
The Army has a new cybersecurity strategy for operational technology, as service officials are concerned about cyber attacks on critical infrastructure.
The White House and agencies are moving out with new cyber requirements for water, healthcare, and emergency communications.
As federal agencies and contractors come to grips with the burden of protecting their software supply chain, understanding who had a hand in the development of their software products has taken on increasing importance. It comes down to pedigree. Where did your software come from? Was it domestic or international? Who had a hand in developing it?
In this exclusive webinar edition of Ask the CIO, Dan Elmore, the executive director of the Idaho National Lab Wireless Security Institute in the Energy Department, said agencies need to better understand the potential impact of 5G on their mission areas.
In a cybersecurity context, “island-hopping” describes an advanced – and increasingly common – form of cyberattack.
The DoD’s CIO and its Office of Undersecretary of Defense for Acquisition and Sustainment will remove weapons systems from the network if they are not cyber secure.
Jamie Holcombe, the chief information officer for USPTO, said a new contract award will help the agency move toward a Secure Access Service Edge (SASE) architecture.
The growing cybersecurity workforce gap is cause for serious concern, particularly when it comes to protecting government assets.
The biggest-yet phase of the bring-your-own-device pilot will help the Army figure out how to scale the technology across a diverse population of users in the active and reserve components — and part of the Air Force too.