Cybersecurity
Working Group Breaks Down the Keys to Securing Mobile Devices
The Federal Mobility Group’s new guidance includes four strategic pillars that form the foundations of mobile security.
Cybersecurity
CISA Seeking Answers for Implementation of Endpoint Detection and Response Tools
The agency has an idea of what it wants from the capability but is soliciting industry input on key aspects of an enduring investment plan.
Cybersecurity
OMB Gives Agencies Three Months to Help CISA Monitor Networked Devices
The memo adds heft to the Cybersecurity and Infrastructure Security Agency’s longstanding push for more visibility into federal networks.
Cybersecurity
CISA Finalizes Guidance for Securing Federal Networks for Remote Users
The latest guidance is the third of four use cases to be released as part of the Trusted Internet Connection 3.0 initiative.
Cybersecurity
Federal CISO Considers Including Technology Modernization in Cybersecurity Metrics
Chris De Rusha is also thinking about how to use the Technology Modernization Fund to create a new shared services program for zero-trust implementation.
Ideas
Prioritizing Breach Prevention for a Secure Government
A more secure government happens when hackers are stopped before they can touch critical data and systems—when a breach is prevented, not mitigated.
Cybersecurity
Commerce Seeks Comment to Implement Trump Cybersecurity Order on Logging Foreign Actors
The rule would require cloud providers to verify the identities of certain users.
Cybersecurity
What’s Next in Cybersecurity
In response to unprecedented attacks, the administration looks to better secure federal agencies and the data they hold.
Cybersecurity
Biden Launches Trilateral Indo-Pacific Partnership to Fuse Cyber Capabilities
The allied trio will also work on getting Australia a nuclear-powered submarine.
Ideas
We Cannot Afford to Wait to Bolster Maritime Cybersecurity
Maritime ransomware attacks are on the rise.
Ideas
Automation Is the Key to Continuous Cybersecurity Compliance
Manually updating spreadsheets to manage the security of cloud offerings isn't going to cut it.
Cybersecurity
National Cyber Director Outlines Staffing Framework for 75-Person Office
Chris Inglis is still trying to distinguish his role and responsibilities from other leading cyber officials.
Cybersecurity
The Government's Software Transparency Journey Moves from Plan to Practice
Allan Friedman, the leader of a transparency initiative at the Commerce Department, is now at the Cybersecurity and Infrastructure Security Agency to realize the ultimate vision for a software bill of materials.
Ideas
5 Steps to Protecting Federal Data Repositories in the Cloud
From ransomware to exfiltration, cybersecurity attacks are targeting sensitive government data. Here’s a reliable approach to protecting mission-critical information.
Ideas
5 Items to Monitor to Detect DDoS Attacks
Government organizations have been a steady target of distributed denial-of-service attacks.
Cybersecurity
White House Announcements to Focus on Advancing Cybersecurity Talent
Commitments are also expected from the public and private sectors for improving the security of foundational technology.
Cybersecurity
U.S. Expands Cybersecurity Collaboration with Singapore
The move comes as China has become more assertive in the region.
Ideas
Dissecting FedRAMP for Containerized Applications
Five essential things federal programs need to know.
Ideas
Augmentation for Data-Driven Success
Augmentation techniques can help the Defense Department implement its data strategy goals.
Cybersecurity
CISA Offers Vulnerability Disclosure Platform for Civilian Agencies
The platform will provide triage and administrative services while allowing CISA to monitor agencies’ progress resolving reports from security researchers.
Almost There!
Help us tailor content specifically for you: