Sponsored Resource

  • Defense

    National Guard plans all-virtual cyber exercise

    The National Guard is taking its annual Cyber Shield training exercise virtual due to COVID-19 with a spotlight on information operations. 09/03/2020

  • Biometrics
    facial recognition technology (Shutterstock.com)

    CBP isn't alerting air travelers to biometrics collection, watchdog says

    Customs and Border Protection's facial recognition program that collects photos of air travelers is hitting its performance targets according to a Government Accountability Office audit, but passengers aren't seeing privacy information and opt-out signage. 09/02/2020

  • Cybersecurity
    malware

    CISA, White House release vulnerability disclosure policies

    The Office of Management and Budget and the Cybersecurity and Infrastructure Security Agency have released a memorandum and Binding Operational Directive guiding federal agencies on how to set up their vulnerability research and disclosure programs. 09/02/2020

  • Cybersecurity
    code scan (Titima Ongkantong/Shutterstock.com)

    CISA bug bounty directive awaits White House blessing

    A draft policy from the Cybersecurity and Information Security Agency instructing agencies to create vulnerability disclosure programs to allow third-party bug hunters to flag security vulnerabilities in federal systems is all-but-completed, sources say. 09/01/2020

  • Comment
    mobile security (Production Perig/Shutterstock.com)

    Cybersecurity in the telework age

    Each mission environment has distinct needs and resources that don’t always fit into a “one-size-fits-all” solution. 08/28/2020

  • Election Security
    open source election technology

    Experts tout election security gains since 2016

    While threats to election infrastructure endure, experts are telling the public not to lose sight of the many security gains that have been put in place over the last four years. 08/28/2020

  • Cybersecurity
    open lock (ESB Professional/Shutterstock.com)

    NASA doesn't know what's on its network

    According to an oversight report, the space agency can't provide an accurate count of the number of contractor-owned devices connected to its networks. 08/27/2020

  • Acquisition
    BY By julia.m Royalty-free stock vector ID: 779956477

    The risks of supply chain threat sharing

    Some of the most valuable data around supply chain threats – identifying suspicious or untrustworthy actors -- can often be legally perilous to share. 08/27/2020

  • Cybersecurity
    threat hunting (alphaspirit/Shutterstock.com)

    Disinformation on the cheap

    Online influence operations are often easy and cheap to set up with open source tooling, according to new research from Cisco Talos. 08/26/2020

  • Cybersecurity
    Paul Nakasone confirmation hearing for NSA

    Cyber Command takes the fight abroad

    The head of U.S. Cyber Command defends "persistent engagement" strategy with adversaries, explaining that proactive cyber operations won't lead the U.S. into an "all out war." 08/25/2020

  • Defense
    lock on a chip (shutterstock.com image)

    DARPA's new hardware proves tough to crack

    The Defense Department's advanced research arm has early results from its effort to prove that re-engineering hardware makes for fewer cyber vulnerabilities. 08/24/2020

  • Comment
    zero trust network

    How zero trust solves the 'weakest link' problem

    Many government agencies currently have components of zero trust already in their infrastructure, including identity credential and access management and continuous monitoring, so moving to a comprehensive zero trust model would just strengthen what is already there. 08/24/2020

  • Cybersecurity
    application security  (Ditty_about_summer/Shutterstock.com)

    Voice phishing attacks on the rise, CISA, FBI warn

    An industry alert warns of an increasingly sophisticated social engineering campaign since July that is targeting VPNs and teleworkers. 08/21/2020

  • People
    DHS assistant director for infrastructure protection Brian Harrell, testify during a House hearing titled, "Confronting the Rise in Anti-Semitic Domestic Terrorism," Feb. 26, 2020.

    CISA infrastructure chief Brian Harrell resigns

    The assistant director, charged with helping to protect critical infrastructure from physical and cyber threats, will be returning to the private sector, the agency confirmed. 08/20/2020

  • People
    Federal CISO Grant Schneider

    CISO Schneider exits OMB for Venable post

    Federal Chief Information Security Officer Grant Schneider is leaving the federal government to take a job at Venable. 08/18/2020

Stay Connected

Opinion that Matters

  • Comment
    shutterstock image By enzozo; photo ID: 319763930

    Don't tap COVID relief for IT modernization funds

    Taxpayer money spent on the response to the pandemic should be targeted and temporary, with significant transparency and accountability, and should not include a proposed $1 billion addition to the Technology Modernization Fund. 09/23/2020

  • Comment
    gears (adike/Shutterstock.com)

    Culture and IT modernization

    Attempting to modernize without a comprehensive approach that accounts for an agency's culture, engages its workforce and addresses critical business practices can actually create new or additional challenges that limit effectiveness and negatively affect mission outcomes. 09/18/2020

  • Comment
    risk management

    Delivering outcomes, building trust

    Few things will derail a project as fast as a lack of focus on mission outcomes and maintaining trust. 09/10/2020