At a National Guard facility in southeastern Indiana, the Army is training cyber soldiers in ways that show them how their keystrokes impact the real world.
The Homeland Security Department issued a Binding Operational Directive requiring every civilian agency to expand how it manages high value assets.
Acquisition and cyber experts say the government’s decision to remove Kaspersky Lab from the GSA schedule and a continued push by lawmakers to ban the technology is highly unusual and could create a trade war.
In the American Innovation and Competitiveness Act, Congress told NIST to take a deep dive into how agencies understand and use the special publications and Federal Information Processing Standards for cybersecurity that it produces.
The General Services Administration’s Technology Transformation Service (TTS) released a draft solicitation asking for industry input in creating a bug bounty program.
To judge the progress of cybersecurity preparedness in the federal government, you’ve got to take a long-term view. One person who’s been tracking cybersecurity and cyber education for more than 20 years, Alan Paller, director of research at the SANS Institute joined the Federal Drive with Tom Temin.
Richard Spires, CEO of Learning Tree International, joins host John Gilroy to discuss how to use continuous learning to close the “skill gap” in the federal government. May 10, 2016
The Homeland Security Department launched a new type of red team effort where they break into an agencies’ networks over the next 90 days and help them make long-term, sustainable fixes.
COMMENTARY: Ron Gula, the CEO of Tenable Network Security, makes the case for CIOs not to get overwhelmed by all the security rules and requirements and instead to focus on a few areas that can make a big difference.
The Office of Management and Budget just posted the latest data from its 30-day cyber sprint. Alan Paller of the SANS Institute and a task force of industry experts offer their insight on what are the next steps agencies should be taking to improve their cybersecurity.