SolarWinds

Graphic By: Derace LauderdaleCybersecurity

CISA details software security keys in new guide for acquisition pros

CISA’s guide helps bridge the gap between acquisition and IT, as the FAR Council works on a highly anticipated software security rule.

Read more
FISMA, cybersecurity

Strategies for strengthening DoD mission partner environments in the face of mounting cyberthreats

Read more
General Services Administration (GSA)

GSA security chief sees concerted focus on ‘applications and workloads’ in coming year

Read more
Getty Images/iStockphoto/ipopbacloud computing

4 steps agencies can take to avoid multi-cloud chaos

Read more
Amelia Brust/Federal News Networkcybersecurity

CISA lays out post-EINSTEIN future with shift to ‘Cyber Analytics and Data System’

CISA is requesting nearly $425 million in 2024 to launch a new “Cyber Analytics and Data System.”

Read more
Conceptual background of Artificial intelligence , humans and cyber-business  on programming technology 
element ,3d illustration

How agencies can build an infrastructure that supports extended reality

A whole new world is coming to the federal government: a virtual world. Thanks to advancements in artificial intelligence, the internet of things, 5G,…

Read more
federal, IT, federal IT leaders, DHS

How agencies can close security gaps with digital twins

One way federal agencies can keep their systems current is to use digital twins for security modeling. Let’s look at this practice and why it’s gaining popularity as the preferred way to patch mission-critical systems and maintain software integrity.

Read more