Shutdown delayed key cybersecurity milestone, but draft will be released well in advance of NIST's next workshop on the guidance.
After June 2014, agencies can use only cloud service providers that are FedRAMP-compliant. Here's what CSPs must do to get there.
Do the shutdown politics and Healthcare.gov coverage make your head spin? Alan Balutis offers a reality check.
Schmidt: Congress' inability to pass legislation that would better define agencies' cybersecurity roles should not be a serious problem, despite a tug of war over who is in charge.
In cybersecurity, where trust is one of the most fundamental pieces in securing and defending networks, many are wondering if the government should rely so heavily on contractors.
The federal government will need 10,000 cybersecurity experts in the near future. But striking the right balance is more complicated than simply recruiting and hiring new employees.
Industry group sees little hope of any market uptick for at least five years.
The Defense Department is learning that older hardware, no longer able to perform its original functions and destined for the scrap heap, can often be put to another use.
As the world increasingly relies on the Internet as part of critical infrastructure, policies to govern cyberspace are beginning to emerge in numerous countries. A Brookings Institution report illuminates and analyzes them, with an eye toward their effects on the broader globalized Internet society.
IBM wants to ensure AWS's latest triumph in the battle to build the CIA's cloud platform is short-lived.
Proposed restrictions are expressly intended to cramp the NSA's practice of assembling and analyzing metadata on Americans.
While a 'checklist' approach to cybersecurity is not effective, audits and compliance can be a tool for improvement.