While states and localities may feel helpless against the endless onslaught of cyberattacks, there are preventative measures they can take to avoid falling victim.
In 2010, the phrase “a zero trust approach to cybersecurity” emerged to describe continuous monitoring and least privilege access control working together.
GovLoop heard from Academy participants who credit the program for their newfound cyber skills. For now, they will use those skills in their current roles.
Congress mandated the new commission to protect U.S. cybersecurity by learning from America’s Cold War strategy for the Soviet Union.
Agencies should take these three key next steps to Improve their FITARA 8.0 scorecards.
Cloud computing is an integral piece of today’s IT government infrastructure. That means cloud security is top of mind for nearly all government leaders.
Some of the main challenges that highlight the complexity of cloud security in government today.
The Defense Department (DoD) is seeking to make history by choosing one vendor as the provider for its cloud computing network.
The Defense Department (DoD) is seeking to make history by choosing one vendor as the provider for its cloud computing network. But the story has had lots of twists and turns. What’s the latest for JEDI?
Digital and smart technologies are transforming our world. The ubiquity of IoT raises operational excitement. It also raises cybersecurity concerns.