Cybersecurity

Working Group Breaks Down the Keys to Securing Mobile Devices

The Federal Mobility Group’s new guidance includes four strategic pillars that form the foundations of mobile security.

Cybersecurity

CISA Seeking Answers for Implementation of Endpoint Detection and Response Tools

The agency has an idea of what it wants from the capability but is soliciting industry input on key aspects of an enduring investment plan.

Cybersecurity

OMB Gives Agencies Three Months to Help CISA Monitor Networked Devices

The memo adds heft to the Cybersecurity and Infrastructure Security Agency’s longstanding push for more visibility into federal networks.

Cybersecurity

CISA Finalizes Guidance for Securing Federal Networks for Remote Users

The latest guidance is the third of four use cases to be released as part of the Trusted Internet Connection 3.0 initiative.

Cybersecurity

Federal CISO Considers Including Technology Modernization in Cybersecurity Metrics

Chris De Rusha is also thinking about how to use the Technology Modernization Fund to create a new shared services program for zero-trust implementation.

Ideas

Prioritizing Breach Prevention for a Secure Government  

A more secure government happens when hackers are stopped before they can touch critical data and systems—when a breach is prevented, not mitigated.

Cybersecurity

What’s Next in Cybersecurity

In response to unprecedented attacks, the administration looks to better secure federal agencies and the data they hold. 

Ideas

Automation Is the Key to Continuous Cybersecurity Compliance 

Manually updating spreadsheets to manage the security of cloud offerings isn't going to cut it.

Cybersecurity

National Cyber Director Outlines Staffing Framework for 75-Person Office 

Chris Inglis is still trying to distinguish his role and responsibilities from other leading cyber officials.

Cybersecurity

The Government's Software Transparency Journey Moves from Plan to Practice

Allan Friedman, the leader of a transparency initiative at the Commerce Department, is now at the Cybersecurity and Infrastructure Security Agency to realize the ultimate vision for a software bill of materials. 

Ideas

5 Steps to Protecting Federal Data Repositories in the Cloud

From ransomware to exfiltration, cybersecurity attacks are targeting sensitive government data. Here’s a reliable approach to protecting mission-critical information.

Ideas

5 Items to Monitor to Detect DDoS Attacks

Government organizations have been a steady target of distributed denial-of-service attacks.

Cybersecurity

White House Announcements to Focus on Advancing Cybersecurity Talent

Commitments are also expected from the public and private sectors for improving the security of foundational technology.

Ideas

Augmentation for Data-Driven Success

Augmentation techniques can help the Defense Department implement its data strategy goals.

Cybersecurity

CISA Offers Vulnerability Disclosure Platform for Civilian Agencies

The platform will provide triage and administrative services while allowing CISA to monitor agencies’ progress resolving reports from security researchers.