The government needs to push adoption of secure by design principles for manufacturing, fielding and managing endpoints, SEI's Greg Touhill says.
The Pentagon is also working with major cloud service providers like Microsoft and Google to evaluate their zero trust implementations.
Implementing zero trust requires a significant cultural shift within all levels of an agency, as zero trust does not start and stop with IT professionals.
Cybersecurity experts from the Army Software Factory, SSA and USCIS say letting developers drive security efforts drives up safety in code.
The Cybersecurity Collaboration Center director pursues whole-of-government approach to helping agencies and industry tackle global cyberthreats.
While there’s no such thing as a silver bullet solution to secure the public sector, continuous pentesting addresses these issues head-on.
DoJ says its policy will encourage independent security and safety research, but will large AI companies follow suit in encouraging vulnerability disclosure?
The new executive assistant director for cybersecurity at CISA details how sharing threat intelligence more broadly pays off.
The IG said CISA made some good improvements to the Automated Indicator Sharing program in recent years.
In the wake of the Change Healthcare ransomware attack, HHS has been expanding its "one-stop shop" for working with the healthcare sector on cyber issues.
The Office of the National Cyber Director wants to fill thousands of open federal jobs under its Service for America initiative.
It’s a case of “haves and have-nots.” Here’s an informal run down of agencies with special cyber pay authorities, including DoD, DHS, and the VA.
Agencies need to break down silos between organizations to monitor the growing volumes of data transiting IT networks, Gigamon’s chief product officer says.
Adversaries seek to gain access to privileged users’ credentials to mimic real users. BeyondTrust and Microsoft experts share ways to counter such attacks.
Cyber adversaries continue to hone their craft. That’s why Google Cloud cyber leader encourages agencies to adapt based on the latest supply chain breaches.