Are agencies getting enough bang for their cyber buck?
Federal agencies are on the hook to adopt a zero trust cybersecurity architecture by Sept. 30. Palo Alto Networks’ Eric Trexler talks about progress so far.
Brandon Wales is the second senior leader to depart CISA in recent months. He led many of CISA's internal and external initiatives over the last three years.
What’s the DMDC’s role in the ICAM strategy?
Here's what we know about how a global IT outage, sparked by a faulty software update from cybersecurity firm CrowdStrike, is impacting federal agencies.
FSAFEDS enrollees will also soon have to transition to Login.gov and complete an identity verification to continue accessing their accounts.
Human resources applications, which touch everyone in the agency, provide a great use case for getting good with cloud, AI and software-as-a-service.
The cloud security program launched two programs, an agile delivery pilot and a new technical documentation hub, to accelerate cloud authorizations.
An academic course endorsed by the Defense Department and delivered by accelerator company BMNT aims to help science and engineering students.
DHS cyber lead Iranga Kahangama also says the proposed cyber incident reporting rule is not "simply a land grab," as some criticize it for being overly broad.
Many regulations require that companies working with national security information implement aggressive levels of cybersecurity.
An amendment in the Senate version of 2025 NDAA would "return decision-making power back to DoD components" to purchase cyber products and services.
Cybersecurity becomes almost a personal matter when you're working in a war zone and information superiority is a must.
“My big thing in the last year has been how do I build the J-2? I need people, I need authorities, I need capability, I need funding,” said Col. Richard Leach.
The intelligence community is also pursuing initiatives in cloud computing, data management, zero trust cybersecurity and quantum-resistant encryption.