Knowing your network is the most foundational step in building a secure organization, but many organizations overlook important edge cases and even mundane events that lead to an incomplete view of their network. Learn the benefits of using a whole-Internet approach to IP address discovery.
Some of the biggest civilian agencies have failed to act on internal cybersecurity audits dating back multiple years, a Senate report found.
Foreign countries are targeting and compromising U.S. contractors so frequently that the Department of Defense asked NIST to develop custom security guidance.
Transportation Security Administration officials want to make good on old priorities to improve technology at airport security checkpoints.
The Marines Corps expects to complete the first implementation of the Joint Regional Security Stacks in Quantico, Va.. by the end of 2019.
DHS is looking for contractors to help develop, integrate and implement capabilities for a host of software systems, that collect biometric and share biometric data.
The defense top-line budget will be a point of contention between the Republican-led Senate and Democrat-led House as they resolve their differences with the 2020 defense authorization bill, a leading lawmaker said on Tuesday.
A new fellowship program for young government cyber hires promises college loan repayment for participants, but the incentives don't reward long government service.
The Democratic senator called for foreign investment reform and decried recent comments by the president that Huawei could be used as a bargaining chip in a trade war with China.
The widespread loss and theft of data on Americans has made a once popular form of remote identity proofing obsolete, and agencies need to start looking into other options.
The House Appropriations Committee approved a series of cybersecurity-related research and development initiatives that are designed to tighten up protection to the electric grid and other energy systems.
Election security, critical infrastructure protection and CDM all received funding boosts, but disagreements on immigration loom over the bill's passage into law.
The personal devices and private email accounts of campaign and political staff are difficult to protect from determined political and nation-state adversaries.
Two experts explain how to put homeland security front-and-center in today's connected world.
Customs and Border Protection acknowledged that images of travelers and license plates collected under its authority were stolen in a breach of a subcontractor's network.
Members of industry involved in supply chain security efforts worry that international trade and other geopolitical concerns are muddying the security focus of their work.
Sign up for our newsletter.
In the era of big data, comprehensive CX programs are recommended for any enterprise to understand every aspect of customer interaction and perception. Though much has changed, that old adage that "the customer is always right" endures.
Rather than getting to the point of no return, agencies should manage cybersecurity through preventative action, technological excellence, hygiene and training.
The policies are now properly aligned, but successful execution will require structural changes.
More Opinion that Matters