Latest ""
Senators wary of VA plans to trim employee numbers
VA leaders have said they plan to trim about 10,000 department posts in fiscal year 2025 in an effort to better manage their workforce.
Opinion
Adding to regulatory burdens doesn’t necessarily improve cybersecurity
Pursuing such policies may actually reduce national security by diverting resources from legitimate activities to secure networks and systems.
By Liselotte Odgaard and Roslyn Layton
Opinion
National Cybersecurity Strategy compliance requires a modernized cloud
At the outset, there’s a need to blend legacy standards and practices with modern components to ensure all systems can communicate effectively.
By Lee Koepping
US Arctic ambassador nomination may freeze due to foreign actions
The nomination for the first U.S. ambassador to the Arctic may remain frozen, despite competition in the region with China and Russia.
Opinion
Congress must help CISA maximize role in protecting the cyber realm
To optimize effectiveness, lawmakers should prioritize collaboration with agency officials when developing targeted legislation and appropriating funding.
By Marty Edwards
Combatant commanders head to Capitol Hill to face budget questions
Defense and veterans hearings on Capitol Hill for the week of March 18, 2024.
Postal workers rally for proposed law protecting letter carriers
Lawmakers proposed a bipartisan bill aimed to protect postal workers from violent crime.
House passes bill that could ban TikTok if Chinese owner won’t sell
The social media platform, which has more than 150 million American users, is a wholly owned subsidiary of Chinese technology firm ByteDance Ltd.
Opinion
Three tips for securing the federal software supply chain
With the evolution of AI, machine learning, and large language models, it's critical that federal agencies have the right tools and processes in place.
By Nick Mistry
Opinion
Persistent engagement is best defense against nation-state adversaries
Sloppy setups, including the use of outdated encryption methods, make attacker infrastructures vulnerable to defenders looking for countermeasures.
By Ian Tarasevitsch and Mike Saxton
Opinion
Removing the Trojan Horse from America’s ports
The software embedded in Chinese-made cranes for loading and unloading cargo could possess clandestine abilities.
By Jiwon Ma and Mark Montgomery