Adopting a security by design approach is helping SolarWinds improve its security while also promoting supply chain security with its customers.
Leader of the Numbered Air Force is fully supporting the “core technology.”
Other nations have joined the fray in trying to alter our democratic processes and our economic stability.
Changing cyber attackers' "thought calculus" is high on his list to accomplish.
Documents will help guide agencies' secure migration of data to the cloud and development of their zero trust architecture implementation plans.
The key to combating fraud on government benefit programs during the pandemic lies in cooperating with oversight authorities and intergovernmental information sharing.
It’s time to abandon the dream of an open, federated, multiplayer identity-provider ecosystem and move on, one of the pioneers of the concept told AFCEA’s Federal Identity Forum.
Ransomware attacks are on the rise and continue to be a disruptive force in the cybersecurity industry.
The Defense Information Systems Agency (DISA) has a new forward-looking strategy comprising five elements.
The threat to the integrity of the U.S. and global financial system posed by the crisis in online identity is a national security issue.
Thunderdome is the Defense Information Systems Agency's solution for zero trust.
The term “whole of government” has been popular since at least the early 2000s to describe an effort to gain an advantage or keep the nation secure. But a whole-of-government approach may not suffice in the cyber, space and information era.
The 16th Air Force’s 688th Cyberspace Wing is making sure the operational and engineering aspects of missions and base operations work with zero trust.
The service’s move to send groups of multicapable airmen in an agile, dispersed manner from main operating bases will be supported by the emerging cybersecurity measure.
Battling terrorists resulted in knowledge to fight near-peer adversaries.
Asked about the changes needed deliver the networking capability needed for a major conflict with a peer or near-peer adversary, experts agreed security is a top priority along with AI.
Cyber ultimately be the determining domain if a capable adversary achieves its combat goals before it even fires a kinetic shot.
Future Navy cybersecurity tools must be interoperable if the fleet is to defend against oncoming threats.
The service is aggressively going after the emerging cybersecurity method.
Current acquisition and infrastructure programs cannot keep pace with the threat environment.