Immigration and Customs Enforcement is looking for an automated system that can prescreen applicants for national security positions and assign a complexity score that reflects the likelihood the candidate would be granted a security clearance.
To shore up security of information and communications technology, the nation must reduce its dependency on suppliers from rival powers, especially China, according to the Cyberspace Solarium Commission.
The Continuous Diagnostics and Mitigation program has been able to provide relevant, timely, actionable cybersecurity information to agencies, helping them fortify civilian government data and networks by deploying millions of endpoint sensors and network scanners across agencies.
It only takes one small breach to dent confidence in the nation’s election systems, according to a digital rights and technology expert.
Security optimization is not about cost cutting; it is about programmatically aligning security and risk services within the organization.
By combining a hardware security module and a client-side automated lookup of credentials, agencies can extend authorized network access to non-person entities.
These 21 projects at the federal, state and local levels show just how transformative government IT can be.
Agencies need smarter, faster ways to get authority to operate, according to a top IT advisor at the Department of Health and Human Services.
Deliberate misdirection of an attack’s source muddies the waters, causing victims to waste valuable time and resources on trying to assign the blame rather than focusing on the immediate responses needed to prevent further harm.
The Cybersecurity and Infrastructure Security Agency is prepping state and local governments for the final rounds in the fight to secure their election critical infrastructure, according to the agency's top risk manager.