Agencies get an updated definition of a cyber incident in a recent Federal Information Security Modernization Act memo.
Based on the "Hack the Pentagon" bug bounty program, the Army's effort will let military personnel and government civilians find vulnerabilities in the Army's recruiting websites.
The Office of Management and Budget is looking for more functionality, security, privacy and oversight of agencies' public-facing websites.
Moving to IP-based networks is the answer -- if the right tools are deployed to ensure security.
Assistant Program Manager, Engineering Sea Warrior Program, Space and Naval Warfare Systems Center Atlantic, Department of the Navy
Experts warn that past transitions have ignored the lessons learned by outgoing administrations, and the stakes are so high now that the Trump Administration needs to heed the advice of Obama's cyber officials.
What does a federal chief technology officer do? It depends.
Two top Army officials reflect on some of the innovation accomplishments of the Obama administration and the challenges that lie ahead for the incoming Trump administration.
The NTIA is hoping to nudge industry to improve collaboration on disclosing cyber vulnerabilities.
As the recent attack on a key internet support company shut down other major online companies, telecom providers were ready to help but faced a legal obstacle.
Government and industry have an opportunity to democratize high-performance computing by making it more accessible to nontechnical users.
Despite earlier hacks and official concerns that Russia or others would seek to sabotage the U.S. elections, there was little sign of malicious cyber activity through most of Election Day. But that doesn't mean all is well.