As promised during the campaign, President Trump has signed an executive order implementing a hiring freeze across most of the civilian federal workforce.
President Obama signed a bill making the Presidential Innovation Fellows program a permanent fixture of government, during his last hours in office.
The first “Hack the Army” bug bounty challenge wrapped up in December, and the results are in with 179 participants finding 118 actionable bugs in public-facing Army websites.
A report by the agency's inspector general says DHS has made progress in cybersecurity training, dual-factor authentication and certifying systems, but more 50 of its unclassified systems still lack authorities to operate.
The federal government's first CISO has stepped down, and it's not clear if the position will survive.
The Obama administration has approved a long-awaited and debated update to the National Cyber Incident Response Plan that outlines roles and responsibilities in response to a significant cyber incident in the U.S.
The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.
Frank Kendall, the outgoing and possibly last undersecretary of defense for acquisition, technology and logistics, says congressional attempts to reform acquisition do more harm than good.
In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.
In his farewell remarks to Department of Defense personnel, Secretary Ash Carter said that the DOD is better and stronger than when he first set foot in the Pentagon 35 years ago.
Wilbur Ross, the Department of Commerce secretary-designate, discussed IT-intensive components of Commerce -- including cybersecurity, spectrum allocation, broadband accessibility and Census operations -- at his Senate confirmation hearing.
Oversight Committee Chairman Jason Chaffetz wants the Department of Homeland Security’s inspector general to look more deeply into reports of unauthorized scans of Georgia's network firewall.