Cyber Policy

  • Michael Daniel. (Image credit: Sean Lyngaas)

    Former cyber czar looks to change info sharing

    As the U.S. government continues to wrestle with policies and programs to share intelligence about cybersecurity threats with the private sector, a small non-profit is trying to change paradigms around information sharing. 03/27/2017

  • Photo courtesy National Security Agency.

    New cyber warriors face culture shock

    The U.S. military services are scrambling to recruit and train new cyber warriors, but that is also requiring cultural changes in institutions known for order, tradition and stability. 03/24/2017

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    Why Trump’s budget bodes well for IT transformation

    Agencies have taken admirable, if cautious, steps to modernize their IT, but wholesale change is needed. Proposed budget cuts just might force that to happen. 03/24/2017

  • GSA looks to streamline cyber buying

    As part of a new strategy for Continuous Diagnostics and Mitigation cybersecurity capabilities, GSA is looking to replace the blanket purchase agreement with a better governmentwide IT contract. 03/23/2017

  • A rare piece of good news for federal cybersecurity

    The author argues that government could eliminate identity-based breaches by 2021, if agencies leverage advances in identity management under CDM. 03/23/2017

  • sphere of binary data

    Army: Electronic domain is contested

    A contested electronic environment is the new normal, say Army leaders, and the service needs to prepare for and train to fight with degraded electronic systems and capabilities. 03/22/2017

  • Shutterstock image: cloud network, concept.

    NGA wants 24-hour cloud ATOs

    One spy agency is looking to "fast architecture churn" to confound would-be cyber attackers. 03/21/2017

  • Shutterstock image (bygermina): data security concept, shield.

    The identity threat

    To provide a robust defense and protect the identity-based perimeter, government agencies must consider new thinking and approaches. 03/21/2017

  • NPPD reorg could make a comeback

    A plan to reorganize DHS' cybersecurity directorate that stalled in Congress last year is still on the agency's agenda. 03/20/2017

  • Electronic voting

    House bill would keep election systems 'critical'

    New legislation in the House would permanently classify states' election systems as critical infrastructure, provide funding to secure voting systems and create cybersecurity standards. 03/17/2017

  • Shutterstock image

    Bipartsian bill looks to aid state and local governments with cyber response

    The legislation would open up new avenues of assistance for state and local cyber incident response and bring resources home for its Texas-based sponsors. 03/17/2017

  • Air Force probes sensitive data leak

    The U.S. Air Force is investigating how a hard drive containing a trove of sensitive files, including background investigation data, was online and publicly accessible. 03/17/2017

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

More from 1105 Public Sector Media Group