ClearShark, a reseller of information technology offerings to the federal government, will distribute cybersecurity software products and services to Department of Defense organizations under an enterprise-wide blanket purchasing agreement. The company said
MoreThe Department of Energy is soliciting public insights on a program funded by the Bipartisan Infrastructure Law that seeks to improve the cybersecurity posture of electric utilities owned by small investors, rural
More by Jane Edwards
The U.S. Cyber Command has completed a 10-day exercise to implement a new concept for searching, identifying and stopping publicly known malware risks. CYBERCOM said Monday the defensive operation sought to improve
More by Jamie Bennet
The demand for cybersecurity professionals in the U.S. grew 2.4 times faster in the last 12 months than the rate across the national economy, according to data analyzed by the CyberSeek platform
More by Jamie Bennet
The Department of Defense Cyber Crime Center’s Cyber Training Academy continues to equip department personnel and international partners with necessary cyber skills through more than a dozen training courses, including the International
More by Naomi Cooper
A team from the U.S. Navy Reserve successfully resolved vulnerabilities within unclassified computer networks of the service branch during an annual U.S. Fleet Cyber Command operation. This year’s Operation Cyber Dragon, which
More by Jamie Bennet
The Federal Trade Commission voted to extend the deadline for submitting public comments regarding the need for new risk mitigation rules for commercial surveillance and lax data security practices. Input will be
More by Jamie Bennet
State chief information security officers are being given more authority to implement cybersecurity initiatives as government agencies transition to digital and virtual operations and services, according to a joint study by professional
More by Jamie Bennet
Cybersecurity should be integrated into the early stages of clean energy deployment to avoid the vulnerability of electric power grid operations in the future, according to a long-term study published by the
More by Jamie Bennet
Vulnerabilities in information technology software platforms such as Apache Log4j, VMWare vCenter Server, and Microsoft Exchange are being exploited by cyber actors linked to the Chinese government in order to hack into
More by Jamie Bennet