The U.S. Air Force is reorganizing several components of the 688th Cyberspace Wing to form a single group to oversee network and security operations. Col. Joshua Rockhill said the new entity will
MoreThe Office of Management and Budget has released an updated guidance on the federal government's implementation of internet protocol version 6 (IPv6). The guidance also calls for agencies to work with external
MoreDeloitte has appointed Matt Gentile, the company’s principal with Deloitte Risk & Financial Advisory, Deloitte Transactions and Business Analytics, as the new head of Deloitte’s government and public services Advisory practice. “In
MoreThomas Wingfield, deputy assistant secretary for cyber policy at the Department of Defense (DoD), has flagged the increasing risk of successful cyberattacks against the U.S. and its allies, and warned that the
MoreThe Senate has voted to pass legislation seeking to establish foundational standards for internet-connected technologies acquired by the U.S. government to help ensure the security of internet of things networks. The IoT
MoreKatie Pehrson and Charlie Givens of Bechtel have been appointed to Control System Cyber Security Association International's ((CS)2AI) fellowship program. Pehrson and Givens will provide (CS)2AI members and industry with support and
MoreSen. Ron Wyden, D-Ore., and Rep. Lauren Underwood, D-Ill., have proposed a bill to improve oversight of federal agencies’ cybersecurity posture. “The Federal Cybersecurity Oversight Act would prevent civilian agencies from punting cybersecurity
MorePeter Ranks, deputy chief information officer for Information Enterprise at the Department of Defense (DoD), said his office will help DoD track its cybersecurity progress when implementing DevOps software development practices. DoD
MoreBAE Systems has recently signed a lease agreement at the Georgia Cyber Center, expanding its footprint in the technology marketplace. “We’re committed to supporting our customer’s mission by bringing innovative solutions that
MoreBill Kalogeros, a public sector adviser at Tempered, said adopting a zero-trust approach along with software-defined perimeter technology could help government agencies prevent unauthorized access to internet of things devices. “Whether or
More