U.S. Cyber Command has made it clear that it must undertake traditional and nontraditional partnerships in order to succeed in a highly dynamic environment.
CS Digest Section: Public Sector
The Department of Defense and the Digital Defense Services have awarded another set of contracts under their "Hack the Pentagon" bug bounty program to security firms HackerOne, Synack and Bugcrowd.
America's networks are threatened daily by criminals, terrorists, and foreign adversaries. In the face of growing threats, the Federal Government has the responsibility to do its part to ensure America has the best cybersecurity in the world. Failures to prioritize cybersecurity by both government and industry have left our Nation less secure.
The US government is taking steps to fix the Common Vulnerabilities and Exposures (CVE) system that's been plagued by various problems in recent years. reade test.
The Pentagon is working on a software "do not buy" list to block vendors who use software code originating from Russia and China, a top Defense Department acquisitions official said on Friday.
The Department of Defense says it has a plan to make sure that all of its public-facing websites are configured in a way that doesn't put the security of their visitors at risk.
The Department of Homeland Security will hold an August industry day focused on public/private collaboration for cybersecurity defense.
A Homeland Security Department dashboard designed to collect and analyze cybersecurity information from across the government is now receiving data from 20 out of 23 major civilian agencies, a department official said Wednesday.
Many federal agencies don't know how hackers are targeting them, can't tell when hackers steal large amounts of their data and aren't efficiently spending the cybersecurity money they have, according to a report and action plan released last week.
The U.S. Department of Homeland Security on Tuesday unveiled a new national strategy for addressing the growing number of cyber security risks as it works to assess them and reduce vulnerabilities.