The plan prioritizes identity authentication, reducing DOD networks’ attack surface, device hardening, and aligning computer network defenders with DOD IT systems and networks.
GSA extended Verisign as the .gov top-level domain registrar for a year while it mulls how to bid out the work.
A recent policy memo from Navy Secretary Ray Mabus differentiates the IT and cybersecurity workforces.
DISA looks to single service provider for mobile device management.
Small agencies feel the cyber talent squeeze more than big agencies, but they’re looking eagerly to CDM-as-a-service to help secure their networks.
An industry advocacy group released a six-point plan asking for improvements to help promote speed and transparency in the government process for vetting cloud service providers.
Top Veterans Affairs officials testified this week that electronic health record sharing with the military is operational, while putting the brakes on modernizing their own health records system.
The court order is a dangerous effort to compel speech in the form of writing software code, said Richard Clarke, a former White House counterterrorism adviser.
DOD has its own "red teams" that probe sensitive defense networks for vulnerabilities, but the Hack the Pentagon initiative goes a significant step further by inviting private-sector hackers to get out their digital scalpels.
The Department of Homeland Security is releasing a new data system for tracking suspected insider threats -- both inside the agency and among those with access to DHS facilities and IT.
The current and former heads of 18F agree that when it comes to digital services, the tech is often secondary at best.
The Department of Justice is resisting calls from some members of Congress to use warrants to access historical geolocation data.