Knowing your network is the most foundational step in building a secure organization, but many organizations overlook important edge cases and even mundane events that lead to an incomplete view of their network. Learn the benefits of using a whole-Internet approach to IP address discovery.
A penetration test found some concerning vulnerabilities at the Federal Housing Finance Agency, but auditors weren't able to gain access.
Sens. Ron Wyden and Marco Rubio have asked the Cybersecurity and Infrastructure Security Agency to consider banning federal employees from using apps created by foreign companies, which they claim could contain spyware.
DOD's research arm is getting ready to test mobile devices that permit information-sharing across multiple security levels from a single platform.
A bipartisan group of senators has reintroduced legislation that would make it easier for cyber specialists in the federal government to detail at other agencies and lend their expertise.
A hacking group behind a widespread cyber espionage campaign against IT service providers has gone quiet since two of its members were indicted but remains an active threat to American businesses.
A joint exercise in Houston last summer highlighted gaps in infrastructure protection.
An interagency process assessed efforts to hack into voting machines and election systems or alter voter behavior through covert influence campaigns on social platforms and other media.
The $5.5 billion commercial health record system is "not survivable in a cyber-contested environment," according to an internal Pentagon report.
A Pentagon watchdog noted improvements in cyber capabilities but worried that adversaries are improving their attacks faster than defenders are shoring up their systems.
In an increasingly crowded field of international frameworks for cyber norms, a non-governmental organization is seeking to shape the terms of the debate.
A new report finds that the federal government is far and away the leading adopter of tools designed to snuff out email and website spoofing compared to other sectors and industries.
A new report from the Defense Department's operational test and evaluation director says the Joint Regional Security Stacks program is undermanned and should be halted until security issues are resolved.
With a short-term spending deal in place, many Democrats on Capitol Hill want to know how much damage the shutdown caused to federal cybersecurity.
The shutdown is having lasting effects on the mission at the Department of Homeland Security, with some effects more evident than others, according to ex-agency officials.
A new U.S. strategy document calls for the U.S. intelligence community to boost cyber threat intelligence sharing and augment data collection and analysis capabilities.
Sign up for our newsletter.
Tech demos have the potential to dramatically improve IT acquisition, Steve Kelman writes. But it needs to be done right.
Government desperately needs a better way to buy cloud services. The Section 809 panel's call to create a new contract type for consumption-based solutions is a great start.
Subject-matter expertise is important, Steve Kelman writes, but don't underestimate the value of fresh perspectives.
More Opinion that Matters