Cybersecurity
-
MBA Program Aims for Quicker Adoption of New Tech at DHS
George Washington University's program will focus on transitioning security technology prototypes to usable products.
7m read -
COVID-19 Accelerating Federal Cybersecurity Development at USDA, VA
The demands of a remote workforce have put renewed emphasis on instating zero trust and secure cloud access.
7m read -
Zero Trust Provides Long-Term Solution for Remote Work
Federal IT leads say the strategy lets agencies ‘use the tools we have’ to modernize security.
7m read -
Video Conferencing Concerns Prompt Government Focus on Remote Cybersecurity
Vulnerabilities lead to questions about home networks and "bring-your-own-device" policies.
7m read -
Update: Cybersecurity Challenges, Solutions Grow with Telework Shifts
One month on, mobile device security and video-teleconferencing platforms enter the spotlight.
7m read -
David Bottom, CIO, SEC
The new CIO discusses how his intelligence-community experience will inform IT efforts at the agency.
23m listen -
Congressional Staff Leaders Strategize Cybersecurity Approach
Key topics include election security, workforce and building public trust.
7m read -
Cybersecurity Solarium Commission Previews Upcoming Report at RSA
The report, to be issued March 11, will outline a national and allied effort to defend in cyberspace.
7m read -
NIST Releases Privacy Framework to Promote Innovation and Trust
The agency encourages organizations to engage with the framework and contribute to the standards' evolution.
7m read -
DISA Leader Calls for Increased Zero Trust in an Era of Cloud
A layered defense approach won’t work anymore — zero trust is necessary as the Defense Department moves to the cloud.
7m read -
Private Sector Cooperation Essential for National Cyber Defense
The U.S. private sector is a crucial contributor for proactive efforts in national cyber efforts, according to Director of the ODNI National Counterintelligence and Security Center Bill Evanina.
7m read -
Promoting Interoperability Starts with Culture of Common Understanding
As threats to information systems evolve, so do the frameworks, regulations and other defenses against those threats.
7m read