The White House and agencies are moving out with new cyber requirements for water, healthcare, and emergency communications.
As federal agencies and contractors come to grips with the burden of protecting their software supply chain, understanding who had a hand in the development of their software products has taken on increasing importance. It comes down to pedigree. Where did your software come from? Was it domestic or international? Who had a hand in developing it?
In this exclusive webinar edition of Ask the CIO, Dan Elmore, the executive director of the Idaho National Lab Wireless Security Institute in the Energy Department, said agencies need to better understand the potential impact of 5G on their mission areas.
In a cybersecurity context, “island-hopping” describes an advanced – and increasingly common – form of cyberattack.
The DoD’s CIO and its Office of Undersecretary of Defense for Acquisition and Sustainment will remove weapons systems from the network if they are not cyber secure.
Jamie Holcombe, the chief information officer for USPTO, said a new contract award will help the agency move toward a Secure Access Service Edge (SASE) architecture.
The growing cybersecurity workforce gap is cause for serious concern, particularly when it comes to protecting government assets.
The biggest-yet phase of the bring-your-own-device pilot will help the Army figure out how to scale the technology across a diverse population of users in the active and reserve components — and part of the Air Force too.
With three new awards to OPM, HUD and the Army, the TMF Board now has "loaned" out $435M out of the $1B it received in the 2021 American Rescue Plan Act.
Industry groups seem to support the Biden administration Sept. 14 memo on secure software development and acquisition
CISA is kicking off Cybersecurity Awareness Month with a new binding operational directive for agencies.
CISA's new Protective DNS service will help defend agencies from a wide variety of cyber attacks, and the lead architect on the program wants to offer the capability to other enterprises.
Cryptocurrencies and other blockchain-based digital assets play an increasingly central role in financial markets. They’re also becoming a more frequent source of regulatory concern, as well as criminal activity.
Cyber resiliency? How’s that different than resiliency? For starters, the focus becomes the agency’s data, not merely continuity of operations. Why? Because data is what most bad actors go after, explains Veeam security expert Jeff Reichard.