Advanced Search
Polaris, the General Services Administration's developing Alliant 2 small business contract replacement, will have CMMC clauses. Read More
Retooling legacy cyber processes, such as the risk management framework, is a top priority for Lt. Gen. John Morrison, the Army's new Deputy Chief of Staff, G-6. Read More
While a new bipartisan bill clarifies that governors can call on the National Guard to protect critical election infrastructure, some states have already activated guard units. Read More
Managing electromagnetic spectrum will become increasingly important as the Army pushes for large-scale operations across domains. Read More
Two contract lawyers take on what vendors really need to know about the Cybersecurity Maturity Model Certification program. Read More
The National Security Agency released details on 25 existing vulnerabilities that Chinese state-sponsored threat groups are using to try to penetrate defense industrial base networks. Read More
To shore up security of information and communications technology, the nation must reduce its dependency on suppliers from rival powers, especially China, according to the Cyberspace Solarium Commission. Read More
The Cybersecurity and Infrastructure Security Agency's efforts to help state and local governments secure their election critical infrastructure are in an intense home stretch for 2020, according to the agency's top risk manager. Read More
Lt. Gen. John Thompson, commander of the Space and Missile Systems Center under the U.S. Space Force, said cybersecurity was increasingly integral to space missions and changes had to be made to infrastructure contracts. Read More
The rule is designed to ensure DOD contractors are adhering to a uniform standard for protecting controlled unclassified information is protected. But while trade groups representing government and defense contractors have lauded the framework but criticized the implementation and rulemaking process. Read More
The White House approved an interim rule to mandate defense contractors prove they adhere to existing cybersecurity standards from the National Institute of Standards and Technology. Read More
Adversaries are adapting to the shifting identity authentication gaps on federal and commercial networks created by the remote work environment, according to federal security experts. Read More
The intelligence community is working out whether it can allow staff to use their own devices for work. Read More
Congress may have to step in to carve out a White House position charged with implementing protective cybersecurity measures. Read More
The independent board charged with implementing the Defense Department's unified cybersecurity standard has new leadership as it announces new milestone hit. Read More
Sign up for our newsletter.
I agree to this site's Privacy Policy.