Sponsored Resource

  • Cybersecurity
    pipeline (Kodda/Shutterstock.com)

    Senate Republicans seek IG probe of TSA pipeline directives

    Republican leaders on the Senate Homeland Security and Governmental Affairs Committee are calling for an inspector general probe into how the Transportation Security Administration developed its first ever pipeline-specific security directives. 11/01/2021

  • Defense
    John Sherman, chief information officer of the intelligence community, leads off day two of the 2018 DoDIIS Worldwide Conference, Aug. 14, 2018, in Omaha, Nebraska.  Photo by Brian Murphy

    White House pick for DOD CIO eyes tweaks to CMMC

    The Biden administration's pick to be the Pentagon's tech chief wants to make it easier for small businesses to adhere to the Defense Department's cybersecurity standards and expand network optimization across the entire enterprise. 10/29/2021

  • Cybersecurity
    Chris Inglis takes a question during a Naval Academy cybersecurity event May 2, 2018. (U.S. Air Force photo by Maj. Jon Quinlan)

    Federal cyber leaders assess TMF awards

    National Cyber Director Chris Inglis said he co-chaired a meeting with top federal cyber leaders this week to analyze current projects with investments from the Technology Modernization Fund. 10/28/2021

  • Cybersecurity
    hacker at work (Alexander Geiger/Shutterstock.com)

    Lawmakers examine TSA's growing role in cyber

    Lawmakers on the Homeland Security Committee convened cybersecurity experts and key stakeholders from the transportation industry to discuss new rules in the works for the transportation sector. 10/27/2021

  • Defense
    computer hack (MARCUSZ2527/Shutterstock.com)

    New missions could present challenges for the DOD cyber workforce

    Mieke Eoyang, the deputy assistant secretary of defense for cyber policy said one of DOD's main cyber workforce challenges is being able to set expectations around policymakers' calls to step in and defend against cyberattacks. 10/21/2021

  • Defense
    Pentagon photo by Air Force Tech. Sgt. Ned T. Johnston

    Biden's pick to lead DOD's weapons testing wants cyber assessments for commercial cloud systems

    The Biden administration's pick to lead the Defense Department's operational testing, Nickolas Guertin, called the department's inability to conduct independent cyber assessments of commercial cloud systems "a severe limitation." 10/19/2021

  • Cybersecurity

    CISA seeks 24-hour timeline for cyber incident reporting

    Two separate Senate bills set different deadlines for federal contractors, critical infrastructure providers and other covered companies to report cyber incidents to the federal government. 10/19/2021

  • Digital Government
    two-factor authentication (Sentavio/Shutterstock.com)

    GSA looks to scale Login.gov with TMF award

    The General Service Administration plans to scale up the Login.gov program to make digital identity verification a more equitable and secure practice after it was awarded nearly $187 million through the Technology Modernization Fund. 10/15/2021

  • Comment
    security breach (Song_about_summer/Shutterstock.com)

    The CISO reporting structure is broken

    The commitment to managing cyber risk is a primary concern, but is often consolidated with IT priorities. This creates a conflict – does IT or security come out on top? 10/14/2021

  • Defense
    Army CIO Raj Iyer presents at AUSA Oct. 13, 2021 (still from DOD video)

    Army CIO sets out to revamp IT policy

    Army CIO Raj Iyer wants to overhaul IT policy so it doesn't stand in the way of the services' goal to become more technologically agile. 10/14/2021

  • Cybersecurity
    Yvette Clarke speaks during memorial service for George Floyd on Cadman Plaza. Editorial credit: lev radin / Shutterstock.com

    Clarke stresses cooperation as momentum builds on Capitol Hill behind breach disclosure legislation

    Rep. Yvette Clarke (D-NY), chair of the Cybersecurity, Infrastructure Protection and Innovation subcommittee, said building trust with critical infrastructure entities was fundamental to expanding information sharing between the public and private sectors. 10/12/2021

  • People
    Chief Information Security Officer for Acquisitions Katie Arrington discusses the Cybersecurity Maturity Model Certification with the Norwegian National Defense and Security Industries Association, the Pentagon, Washington, D.C., Jan. 13, 2021. (DoD photo by Air Force Staff Sgt. Brittany A. Chase)

    CMMC's Arrington sues DOD to clear her name

    Katie Arrington, who has been off the job since May, is suing the Department of Defense to get resolution on her personnel case. 10/12/2021

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    How training fits into cyber workforce development

    In a tight market for cyber talent, training is one way to show the workforce you've invested in them, says Jason Gray, the Department of Education's CIO and co-chair of the CIO Council's Workforce Committee. 10/11/2021

  • Cybersecurity
    security dashboard (KanawatVector/Shutterstock.com)

    White House looks to step up endpoint monitoring

    The Biden administration is requiring agencies to provide visibility into their endpoint detection and response efforts as part of the cybersecurity executive order. 10/08/2021

  • Workforce
    IT team meeting (Gorodenkoff/Shutterstock.com)

    CISA chief looks to new system to attract cyber talent

    Despite increasing competition among the public and private sectors in hiring top cyber talent, CISA Director Jen Easterly said she has high hopes for a new personnel management system which reduces friction in hiring and offers new career paths. 10/07/2021

Stay Connected

Opinion that Matters

  • Comment
    women at work (Gorodenkoff/Shutterstock.com)

    Creating greater opportunity for women in digital services

    The government can use its purchasing power to grow contracting opportunities for women-owned businesses. 12/02/2021

  • Comment
    Zero trust (Shutterstock.com)

    Zero-trust has a branding problem

    A zero-trust approach to cybersecurity is intended to increase vigilance and minimize risk, but without the necessary context, the concept could raise discomfort or even hostility among federal workers. 11/02/2021

  • Comment
    security breach (Song_about_summer/Shutterstock.com)

    The CISO reporting structure is broken

    The commitment to managing cyber risk is a primary concern, but is often consolidated with IT priorities. This creates a conflict – does IT or security come out on top? 10/14/2021