
GAO said Wednesday said these measures include establishing a comprehensive cybersecurity strategy, updating governmentwide data security programs and increasing federal role in infrastructure protection efforts.
The government audit agency found that the U.S. government has not yet implemented 1,000 out of the 3,000 recommendations the watchdog has provided since 2010.
Federal information systems will continue to remain vulnerable to sophisticated virtual attacks unless authorities move to address cybersecurity shortcomings, GAO noted.
Related Articles
President Donald Trump has signed an executive order approving a proposed deal that would keep video-sharing platform TikTok operational in the U.S. while protecting national security. Engage with U.S. military leaders and top industry experts at the Potomac Officers Club’s 2025 GovCon International and Global Defense Summit as they tackle global defense challenges, from supply chain risks to sanctions and international regulations. Save your spot now for this Oct. 16 event to gain critical insights and connect with key decision-makers! ‘Qualified Divestiture’ of TikTok’s US Operations In a fact sheet published Thursday, the White House said TikTok’s U.S. operations would
The Cybersecurity and Infrastructure Security Agency has published an emergency directive to warn against attackers targeting vulnerabilities affecting Cisco Adaptive Security Appliances, or ASA, web services. In the memo issued Thursday, CISA said all federal civilian executive branch departments and agencies must take actions to prevent or respond to compromises. For more updates from CISA and the entirety of the Homeland Security Department, make sure to send the best and brightest from your GovCon company to Potomac Officers Club’s 2025 Homeland Security Summit on Nov. 12. Register for this essential networking and technology conference now! “As the lead for federal
The Department of Defense has started implementing a five-phase construct that seeks to provide real-time cyber defense at operational speed and ensure that U.S. warfighters maintain technological superiority against evolving cyberthreats. 5 Phases of DOD’s Cybersecurity Risk Management Construct DOD said Wednesday the Cybersecurity Risk Management Construct, or CSRMC, consists of five phases aligned to system development and operations: design, build, test, onboard and operations. The design phase, for instance, aims to ensure resilience of system architecture by embedding security at the outset. “This construct represents a cultural fundamental shift in how the Department approaches cybersecurity,” said Katie Arrington, a Wash100 awardee who