Administration priorities to emerge are grant funding, federal workforce compensation, equity, career development, cybersecurity and more.
Posts Tagged: CISA
Users can be exposed to phishing threats through all kinds of mobile channels, particularly as the remote workforce increased suddenly in 2020.
This roundtable discussion covered topics, from the continued relevance of the original TIC vision to the uncertainty and excitement about its evolution.
At the Cybersecurity and Infrastructure Security Agency (CISA), Preston Werntz wants to make data literacy top of mind for all employees.
The futuristic world that movies foretold hinges on a new faster, broad-spectrum wireless network. But as 5G rolls out, security concerns roll in. This time, the Cybersecurity and Infrastructure Security Agency (CISA) is one step ahead in protecting its prized assets.
The hope now is that agencies won’t have to bend backwards to satisfy TIC. The hope is that TIC will instead be flexible enough for agencies to adopt modern solutions tailored to their needs.
Before emerging technologies can transform an agency, the data has to be standardized, accessed and shared, directed by organizational guidance.
CISA released an emergency directive about a number of incidents concerning Domain Name System (DNS) infrastructure tampering.
Securing sensitive data against the sheer number of cyberthreats is an impossible task for a single organization. It’s akin to sending one soldier to battle against an army of millions. In an effort to strengthen the nation’s defense against cyberthreats, Congress passed and President Obama signed into law the Cybersecurity Information Sharing Act of 2015… Read more »
How far is too far when it comes to protecting sensitive data from possible or perceived cyberthreats?