Hello, Guest!

Category: Cybersecurity

Executing the National Cybersecurity Strategy Calls for a ‘Common Language’ Between Public & Private Sectors, Cyber Leaders SayCybersecurity

Executing the National Cybersecurity Strategy Calls for a ‘Common Language’ Between Public & Private Sectors, Cyber Leaders Say

As adversaries continue to develop and deploy new technologies, cyberattacks pose a greater threat to the United States than ever
Brig. Gen. Reid Novotny: CYBERCOM Working to Make Coast Guard Part of Cyber Mission Force; Priorities Not Likely to Shift Post-NakasoneCybersecurity

Brig. Gen. Reid Novotny: CYBERCOM Working to Make Coast Guard Part of Cyber Mission Force; Priorities Not Likely to Shift Post-Nakasone

The United States now regularly and publicly participates in cyber warfare. However, 20 years ago — even as recently as
How Zero Trust Can Protect Critical Infrastructure & Secure Edge DevicesCybersecurity

How Zero Trust Can Protect Critical Infrastructure & Secure Edge Devices

The persistent threat of cyber attacks has been a top concern for the Department of Defense in recent years. Now,
‘Resourced Community Has to Do More’ to Achieve an ‘Optimistic Future’ for National Cybersecurity, Says Federal CISOCybersecurity

‘Resourced Community Has to Do More’ to Achieve an ‘Optimistic Future’ for National Cybersecurity, Says Federal CISO

It’s a cliché at this point to say the government moves slowly in terms of technology modernization and procurement of
DOD’s David McKeown: Pentagon Moving to Quantum-Resistant Algorithms in Crypto Modernization PushCybersecurity

DOD’s David McKeown: Pentagon Moving to Quantum-Resistant Algorithms in Crypto Modernization Push

Quantum computing is a rapidly-growing technology that, when fully developed, will far surpass the capabilities of classical computers. But although
Don’t Miss These 3 Key Cyber Contract OpportunitiesCybersecurity

Don’t Miss These 3 Key Cyber Contract Opportunities

The cyber domain has become more influential than ever before, bringing about new capabilities and new threats. To keep up
HP Federal CTO Tommy Gardner Discusses Challenging Digital Ethics Conundrums & the Cyber Threat VectorArtificial Intelligence

HP Federal CTO Tommy Gardner Discusses Challenging Digital Ethics Conundrums & the Cyber Threat Vector

Tommy Gardner, chief technology officer at HP Federal and vital participant in Executive Mosaic’s GovCon Expert program, is a seasoned
Cyber Experts Illuminate Human Core of Maintaining Security at the Tactical EdgeCybersecurity

Cyber Experts Illuminate Human Core of Maintaining Security at the Tactical Edge

New capabilities brought about by the digital revolution have transformed the way the Department of Defense approaches data and connectivity. While
Accenture, Raytheon, Stellar Ventures Invest in Space Cybersecurity Company SpiderOakCybersecurity

Accenture, Raytheon, Stellar Ventures Invest in Space Cybersecurity Company SpiderOak

SpiderOak has received investments from the venture capital arms of Accenture (NYSE: ACN), Raytheon Technologies (NYSE: RTX) and Stellar Ventures
DOD CIO Says CMMC 2.0 Coming Soon: ‘We Want to Get This Right’Cybersecurity

DOD CIO Says CMMC 2.0 Coming Soon: ‘We Want to Get This Right’

The Cybersecurity Maturity Model Certification has been divisive throughout its creation over the last decade-plus, but especially since its implementation