The futuristic world that movies foretold hinges on a new faster, broad-spectrum wireless network. But as 5G rolls out, security concerns roll in. This time, the Cybersecurity and Infrastructure Security Agency (CISA) is one step ahead in protecting its prized assets.
The Air Force is in the vanguard of major organizations that are looking to something called zero trust architecture. GovLoop sat down with William Marion, the service’s Deputy Chief Information Officer (CIO), to learn more about its strategy.
As the government’s complete reliance on digital technologies expands, it becomes harder to secure the growing network of new devices, IT systems and cloud solutions. In short, the network is the mission.
This blog is the third of six upcoming articles from GovLoop about the growing cybersecurity threat known as ransomware.
Agencies need the ability to adjust their services to their consumers’ needs in days or minutes — not months.
Many organizations have begun reviewing and revising their security best practices in advance of suffering a debilitating cyberattack by taking an indicators-of-attack or IOA-based detection and prevention approach when dealing with advanced adversaries.
With campaigns of mass and fake comments plaguing public feedback mechanisms for regulatory agencies, GSA seeks public input on potential solutions.
This blog is the second of six upcoming articles from GovLoop about the growing cybersecurity threat known as ransomware.
DevSecOps requires new tools and tactics, as it builds on the cultural changes of DevOps to integrate the work of security teams sooner rather than later.
To keep their data, applications and operations protected, agencies need to execute their security procedures in as close to real time as possible.