![](https://www.federaltimes.com/resizer/Nagv8DFss6MzGRro6ry3rU83uyk=/400x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4V7OZPJ4DNH6FLIS6U7CY3LODQ.jpg)
Latest ""
![](https://www.federaltimes.com/resizer/Nagv8DFss6MzGRro6ry3rU83uyk=/400x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/4V7OZPJ4DNH6FLIS6U7CY3LODQ.jpg)
![](https://www.federaltimes.com/resizer/3mW755kpZh3SiV8PWN0VqlvRAXg=/400x0/filters:format(jpg):quality(70)/cloudfront-us-east-1.images.arcpublishing.com/archetype/JNTE2NDIJMXUCL3ROZJHC2LYHE.jpg)
Election officials seek changes to federal rule on cyberattack reports
The proposed rule says state and local election offices must report suspected breaches within 72 hours.
By Christina A. Cassidy
Opinion
How to establish an effective data management governance program
A compliance program should be able to clearly articulate the criteria for evaluating success, highlighting the technology or processes required.
By Joah Iannotta
Opinion
Navigating fed cybersecurity: Strategies to achieve network compliance
The complexities of federal cybersecurity guidance necessitate a multifaceted approach to achieving compliance.
By Matt Honea