House Appropriations Subcommittee on Homeland Security members questioned CISA leaders about plans to improve federal cybersecurity efforts.
During a virtual workshop with DoD tech leaders, Deputy CIO for Cybersecurity and Senior Information Security Officer Dave McKeown stressed accountability for preserving cyber readiness.
From a security perspective, the deployment of new equipment, software and virtualized technology to manage communications networks and carrying over some legacy systems are important.
In today's Federal Newscast, any agency wanting a brand new website will have to go through a new provider.
CISA says exploitation of verified credentials in the SolarWinds breach should be cause for alarm and give rise to tighter identity controls in the federal government.
So far in the big stimulus bill, contractors got an extension of section 3610, which gives them a sort of ongoing protection from the pandemic.
For DoD, the cloud is about one thing: Improving capability delivery to warfighters, and doing it more quickly and more securely.
In today's Federal Newscast, the Department of Homeland Security is asking for feedback from vendors on how it should pay in-demand cybersecurity experts.
The Senate approved $650 million for agency cybersecurity upgrades, and another $350 million for the U.S. Digital Service and the Federal Citizen Services Fund to address workforce and other modernization needs.
This week on Federal Tech Talk, Will LaForest, public sector CTO at Confluent joins host John Gilroy to discuss federal use cases that apply the event streaming platform Apache Kafka and how it fits into the federal data strategy.
President Joe Biden's choices to lead the Office of Management and Budget described several top priorities at their nomination hearing on Thursday, including a focus on creating a more diverse recruitment pool and inspiring more people to serve in the federal government.
Air Force officials are looking to expand the program under which new equipment is designed completely digitally, and moving to construction without blueprints or clay models.
Following the SolarWinds breach, the Interim National Security Strategic Guidance seeks to impose “substantial costs through cyber and noncyber means” on the perpetrators of advanced cyber threats.
The Cybersecurity and Infrastructure Security Agency said exploitations could let hackers gain persistent system access and control of an enterprise network.
Federal human capital challenges are the root cause behind two-thirds of the broad topics on the Government Accountability Office's biennial high-risk list. And while GAO removed one program from the list, some areas have regressed.