ClearShark, a reseller of information technology offerings to the federal government, will distribute cybersecurity software products and services to Department of Defense organizations under an enterprise-wide blanket purchasing agreement. The company said
MoreThe Department of Energy is soliciting public insights on a program funded by the Bipartisan Infrastructure Law that seeks to improve the cybersecurity posture of electric utilities owned by small investors, rural
MoreThe U.S. Cyber Command has completed a 10-day exercise to implement a new concept for searching, identifying and stopping publicly known malware risks. CYBERCOM said Monday the defensive operation sought to improve
MoreThe demand for cybersecurity professionals in the U.S. grew 2.4 times faster in the last 12 months than the rate across the national economy, according to data analyzed by the CyberSeek platform
MoreThe Department of Defense Cyber Crime Center’s Cyber Training Academy continues to equip department personnel and international partners with necessary cyber skills through more than a dozen training courses, including the International
MoreA team from the U.S. Navy Reserve successfully resolved vulnerabilities within unclassified computer networks of the service branch during an annual U.S. Fleet Cyber Command operation. This year’s Operation Cyber Dragon, which
MoreThe Federal Trade Commission voted to extend the deadline for submitting public comments regarding the need for new risk mitigation rules for commercial surveillance and lax data security practices. Input will be
MoreState chief information security officers are being given more authority to implement cybersecurity initiatives as government agencies transition to digital and virtual operations and services, according to a joint study by professional
MoreCybersecurity should be integrated into the early stages of clean energy deployment to avoid the vulnerability of electric power grid operations in the future, according to a long-term study published by the
MoreVulnerabilities in information technology software platforms such as Apache Log4j, VMWare vCenter Server, and Microsoft Exchange are being exploited by cyber actors linked to the Chinese government in order to hack into
More