Hello, Guest!

Category: Cybersecurity

UberEther’s Matt Topper: Identity & Access Management Key to Advancing Federal CybersecurityCybersecurity

UberEther’s Matt Topper: Identity & Access Management Key to Advancing Federal Cybersecurity

Matt Topper, president of UberEther, said government agencies seeking to protect sensitive data from unauthorized access, data breaches and other cyberthreats
Bipartisan Senate Bill Seeks to Create Framework to Harmonize Federal Cybersecurity RegulationsCybersecurity

Bipartisan Senate Bill Seeks to Create Framework to Harmonize Federal Cybersecurity Regulations

Sens. Gary Peters, D-Mich.,‚ÄĮand James Lankford, R-Okla., have proposed a bipartisan bill that would establish an interagency committee within the
White House Memo Details Cybersecurity Investment Priorities for FY 2026 BudgetCybersecurity

White House Memo Details Cybersecurity Investment Priorities for FY 2026 Budget

The White House Office of Management and Budget and the Office of the National Cyber Director have released a memorandum
CIO Office Unveils Department of the Air Force Zero Trust StrategyCybersecurity

CIO Office Unveils Department of the Air Force Zero Trust Strategy

The Department of the Air Force’s Office of the Chief Information Officer has released a new strategy that seeks to
4 Tips to Elevate Your Company’s CybersecurityCybersecurity

4 Tips to Elevate Your Company’s Cybersecurity

The cyber threat landscape is ever changing, and businesses can’t afford for their cybersecurity posture to lag behind. According to
Experts Discuss Culture Element of Zero Trust ImplementationCybersecurity

Experts Discuss Culture Element of Zero Trust Implementation

Zero trust ‚Äď a security strategy based on the continuous authentication of all users within and outside an organization‚Äôs network
How Public-Private Partnerships Can Bolster Cybersecurity, According to ExpertsCybersecurity

How Public-Private Partnerships Can Bolster Cybersecurity, According to Experts

Industry offers a wealth of advanced technologies and a workforce trained on using these tools ‚Äď a set of resources
Capt. Michael Cribbs Dives Into CGCYBER’s 3 Lines of EffortCybersecurity

Capt. Michael Cribbs Dives Into CGCYBER’s 3 Lines of Effort

Today, the cyber and physical realms are closely intertwined, with cyberattacks having the potential to disrupt critical functions across all
DOD Cyber Leader David McKeown Previews CMMC 2.0, Applauds ‚ÄėTremendous Perseverance‚Äô of Its ArchitectsCybersecurity

DOD Cyber Leader David McKeown Previews CMMC 2.0, Applauds ‚ÄėTremendous Perseverance‚Äô of Its Architects

There has been very little resistance to funding and beginning to implement the Department of Defense’s zero trust cybersecurity strategy,
Unlock These 5 Benefits at the 2024 Cyber SummitCybersecurity

Unlock These 5 Benefits at the 2024 Cyber Summit

The cyber landscape is in a constant state of flux as new threats, vulnerabilities, opportunities and technologies continue to emerge.