Three groups have competing equities in defense IT acquisition, and learning to balance risk among them is the key to success.
The longtime government IT leader had announced his plan to leave the Defense Department in late March.
An advisory memo details shared code and other signs of intent to penetrate vulnerable systems.
A joint policy statement assures companies they can share cyberthreat information without violating antitrust laws.
Cybersecurity leader Larry Zelvin claims "core citizen-facing websites are not exposed to risks" from the security flaw.
The two-day, closed-door exercise brought together contractors and defense agencies in a test of cyberwarfare.
IRS.gov and HealthCare.gov remain secure, while GSA defends the reliability of open source software.
The Cyber Defense Exercise, now in its 14th year, is designed to put classroom lessons to use in the real world.
The IRS has failed to consistently install appropriate patches on all databases and servers to protect against known vulnerabilities, GAO found.
Continuous diagnostics and mitigation will allow agencies to have a clearer view of vulnerability gaps, and could also aid forensic investigators after the fact.
The Section 516 rule seeks to eliminate IT gear from firms that are responsible for cyberattacks on U.S. companies or have ties to China's military.
Disaster recovery as a service offers advantages, experts say, but agencies must understand the risks.