Knowing your network is the most foundational step in building a secure organization, but many organizations overlook important edge cases and even mundane events that lead to an incomplete view of their network. Learn the benefits of using a whole-Internet approach to IP address discovery.
Members of the House Homeland Security Committee quizzed experts about the capabilities of Iran's cyber forces.
This will be the year when IT governance practices drive a new wave of mission benefits, rather than just better control over IT infrastructure spending.
Agencies can use new guidance documents on Trusted Internet Connections 3.0 to jumpstart their own pilot programs and suggest improvements to the policy.
Training of the third-party accreditors for the DOD's upcoming unified cybersecurity standard will take place from now until June.
The top intelligence official charged with election security said agencies have evolved to more quickly declassify and share information, but the threat landscape is more muddled this time around.
Attackers could use the vulnerability to trick users into installing "updates" from trusted parties that are actually malware.
The Department of Housing and Urban Development is failing to safeguard and manage more than 1 billion records containing personally identifiable information, according to a management alert from the agency's internal watchdog.
A State Department official suggested the U.S. could seek to limit intelligence sharing with allies who use Huawei products for 5G, but stopped short of endorsing a legislative ban.
The panel would be charged with identifying federal regulations and challenges that may inhibit the development or deployment of IoT and examine how federal agencies could benefit from greater reliance on connected devices.
Defense contractors should be getting ready for the Defense Department's impending cybersecurity standard expected to be released this month.
In a congressional hearing, executives from the three major voting machine manufacturers said they were open to new reporting and regulatory requirements.
Ty Schieber will head the accrediting body for DOD's upcoming cybersecurity certification program.
Leveling up CISA and CyberCom and streamlining Congressional jurisdiction will be among the recommendations issued in an upcoming report from the Cyberspace Solarium Commission.
U.S. officials and cybersecurity experts are concerned that Iranian reprisals for the killing of Soleimani could take the form of attacks on U.S. networks or critical infrastructure.
Iran has threatened to respond to the targeted killing of senior general Qassem Soleimani, and analysts say the goal will be to punish the U.S. by targeting its IT and critical infrastructure while avoiding traditional military conflict.
Sign up for our newsletter.
New entrants bring new applications that add significant value to government data.
In a rapidly changing environment, expecting overworked acquisition staff to become experts in every emerging technology is unrealistic.
More Opinion that Matters