Federal investigators have their hands full trying to spot all of the fraud schemes that cost the government billions of dollars every year.
Cyber risk management is vital for protecting the nation’s data assets from cyber adversaries. Yet the Government Accountability Office uncovered security gaps in risk management as the agency analyzed the effectiveness of the 2023 National…
A new audit looks at how one agency within the Department of Health and Human Services (HHS) manages its cloud computing assets.
NIST says the new updates are the result of data collection, technical analyses, customer interaction, redesign and development of the security requirements.
Government agencies are continually looking at new technologies that can impact mission priorities and enhance service delivery.
A CYBERCOM acquisition leader says she doesn’t want the command’s burgeoning buying program to be ‘stodgy and antiquated.'
Remember, strong data security isn't a barrier. It's a necessary — and cost-effective — bridge to a brighter future.
Genesys public sector CTO details how StateRAMP authorization and FedRAMP reciprocity help state governments with cloud cyber.
CISA's directive comes after Russian hackers broke into Microsoft's corporate email accounts and stole messages with customers, including federal agencies.
Sean Connelly, the senior cybersecurity architect and TIC program manager for CISA, is joining Zscaler to work on international zero trust efforts.
DHS is aiming to hire 50 experts to help its components responsibly develop and adopt artificial intelligence.
CYBERCOM also has 'enhanced budget control' over cyber forces thanks to the fiscal 2024 appropriations bill, as officials craft plans for 'CYBERCOM 2.0.'
The Technology Modernization Fund handed out more than $47 million to NASA and the Labor Department for cybersecurity and application modernization projects.
The Okta breach provides an opportunity for federal agencies to reassess and strengthen their cybersecurity posture.
How are strategies evolving to stay ahead of tomorrow's cyber threats?