Victoria Coleman, chief scientist of the U.S. Air Force, has urged the service branch to adopt a zero-trust approach for securing microprocessor chips in military computing and weapon systems. The former director
MoreThe office of inspector general at the U.S. Agency for International Development has issued an audit report saying USAID has implemented key components of an effective privacy program but needs to carry
MoreThe U.S. and Singapore will expand cybersecurity cooperation under a memorandum of understanding. “The MOU allows us to strengthen our existing partnership with Singapore so that we can more effectively work together
MoreThe Army's Cyber Center of Excellence (CCoE) aims to help the military service create a doctrine publication as part of efforts to gain an information advantage in the future battlefield. Brig. Gen.
MoreThe Department of Energy (DOE) announced several efforts that have been initiated since the launch of the Biden administration’s Industrial Control Systems Cybersecurity Initiative in April. Some of those efforts include the
MoreThe Department of Homeland Security (DHS) is carrying out a pathfinder assessment to chart a course forward as it works to further advance the process of evaluating vendors’ compliance with cyber hygiene
MoreThe Cyberspace Solarium Commission (CSC) outlined 82 policy recommendations in March 2020 to transform how the federal government responds to cyber threats and of those recommendations, 22 percent have been fully implemented.
MoreThe House Homeland Security Committee has asked National Cyber Director Chris Inglis to help clarify the roles and responsibilities of federal cybersecurity leaders and how he will ensure coordination across his office,
MoreThe Cybersecurity and Infrastructure Security Agency has issued a guide meant to help cyber and information technology professionals improve their skills and expand their career options in the cybersecurity field. The Cybersecurity
MorePaul Blahusch, chief information security officer at the Department of Labor (DOL), said they are working on a new implementation approach that builds on zero trust architecture in compliance with the White
More