Cyber Security
Officials stressed the importance of maintaining a bill of materials for software in flagging the “Log4j” vulnerability. The Cybersecurity and Infrastructure Security Agency has...
Hi, what are you looking for?
Officials stressed the importance of maintaining a bill of materials for software in flagging the “Log4j” vulnerability. The Cybersecurity and Infrastructure Security Agency has...
The watchdog made several recommendations in an audit of the Cybersecurity Maturity Model Certification effort. The Defense Department needs to improve communication with industry...
The SolarWinds cyberattack was unprecedented in both scope and scale. The sophisticated breach saw hackers bake their exploit into a trusted software update pushed...
The Pentagon struggles to manage the lifecycle—including security and costs—of those assets. IT asset management (ITAM) presents one of the biggest challenges to the...
Cyber policy lead Mieke Eoyang discussed the Defense Department’s role in the nation’s cybersecurity posture, including in defending elections and countering ransomware attacks. Those...
“This is not Cold War 2.0 and China is not the Soviet Union,” Gen. Paul Nakasone said. The government has long leaned on partnerships...
The bipartisan measure introduced as an amendment to the National Defense Authorization Act makes other significant changes to legislation introduced in September. An amendment...
The Pentagon outlined the changes ahead for its Cybersecurity Maturity Model Certification program with two new rulemaking processes. The Defense Department is significantly scaling...
More than 100,000 users and counting are accessing new cloud-based capabilities. BALTIMORE, MD. — Defense Information Systems Agency senior officials on Thursday confirmed they’re...
Lt. Gen. Groen concedes culture must change, but says faster development is already on the way. SEA ISLAND, Georgia—Weeks after the Air Force’s first...
Recent Comments