More Cybersecurity News

  • workers (nd3000/Shutterstock.com)

    Filling the federal cyber talent pipeline

    The Cybersecurity Talent Initiative aims to jumpstart cyber careers by placing university graduates in federal agencies.

  • How will the AWARE score improve government security?

    Because it is based on foundational controls -- finding and patching vulnerabilities, making sure systems are securely configured and monitoring systems for change -- AWARE will go a long way in helping agencies maintain a strong security posture.

  • automating security (sitthiphong/Shutterstock.com)

    Staying ahead of the hack: Is government moving fast enough?

    By combining the best human talent and technology, agencies can reduce security costs, free up resources and set security teams up for success.

  • cybersecurity (vs148/Shutterstock.com)

    Save money and improve network security through automation

    Automated network security can help agencies reduce downtime, enable cost-saving consolidation and make the best use of limited staff resources.

  • nationwide cybersecurity

    Is DHS cyber under-resourced?

    While the cybersecurity mission at the Department of Homeland Security has been steadily expanding, some think the agency may not have the resources to protect federal civilian networks.

  • global analytics (metamorworks/Shutterstock.com)

    FBI's cyber challenge exceeds its bandwidth

    Data-intensive criminal and counterintelligence investigations require more cyber tools, greater info-sharing capabilities and a highly skilled staff, FBI Director Christopher Wray told appropriators.

  • Mobile worker accessing office network

    Putting advanced mobile security on CDM DEFEND

    As the mobile threat landscape continues to evolve in a post-perimeter world, smoother acquisition processes and funding for the best possible security must keep pace.

  • business people with long shadows (robertindiana/Shutterstock.com)

    The shadow IoT lurking on enterprise networks

    Controlling unauthorized internet-of-things devices that connect to enterprise networks requires a different technical approach than BYOD management because IoT devices often lack authorization and authentication tools.

  • cybersecurity quality assurance

    Where supply chain security breaks down

    While large defense contractors typically have robust security measures in place, the smaller and medium-sized companies they subcontract with do not, making them prime targets of nation-state hackers.

  • IARPA

    IARPA's vision for High-ClaaS cloud security

    Intelligence Advanced Research Projects Agency's High ClaaS (for classified as a service) program encourages development of technologies that would allow highly isolated computing tasks to be run on shared commercial clouds.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.