FTC Commissioner Terell McSweeny joined Gigi Schumm on Women of Washington to discuss her passion of helping to protect consumer privacy in the digital era.
Secretary Kirstjen Nielsen highlights how DHS plans to take a more forward-leaning approach to cybersecurity.
Sean Brune, chief program officer for IT modernization, said the Social Security Administration’s modernization efforts aim to update software’s programming language and improve systems already used by the public.
With no one in charge, it looks as if the White House is only slightly concerned with instituting an effective cybersecurity strategy.
A GAO report found holes in CMS’ systems for protecting private health data between entities.
In today’s Federal Newscast, the Defense Department will be sending up to 4,000 troops to U.S.-Mexico border to assist the Homeland Security Department.
Among more than 1,000 questions about DoD’s upcoming JEDI contract, dozens of vendors questioned its single-award approach. But the Pentagon isn’t changing its strategy.
What is the Zero Trust Security model and how will it help federal IT professionals protect the data at their agencies? Find out when Sean Frazier, Advisor CISO – Federal at Duo Security, joins host John Gilroy on this week’s Federal Tech Talk. April 17, 2018
At what point does a cyber attack become an act of war? No one really knows
The General Services Administration’s System for Award Management still is recovering from a second fraud incident in the last three years.
The Office of Management and Budget is seeking comments on a draft policy that promotes shared services for identity credentialing and access management.
Russell Roberts, the TSA chief information officer, said IT network and hardware upgrades are laying the groundwork for cloud migration.
Securing vehicle software updates, telephone network attacks at 911 centers and mobile app vulnerability are among the agency’s research projects underway.
Jeff Peters, the director of the national government sector for Esri, makes the case for integrating GIS into your cyber defenses.