The Department of the Air Force has formed the AF/A6 Deputy Chief of Staff office to oversee warfighter communications and cyber systems. Register for the Potomac Officers Club’s 2025 Air and Space Summit on
MoreDefense Secretary Pete Hegseth, a 2025 Wash100 Award recipient, has ordered immediate action to secure the Department of Defense’s information technology capabilities from adversarial influence. Protecting DOD Supply Chain From Adversarial Threats
MoreThe National Institute of Standards and Technology has released draft revisions to Special Publication 800-53. The federal agency said Tuesday the proposed changes aim to enhance the secure and reliable deployment of software
MoreKatie Arrington, a previous Wash100 awardee who currently performs the duties of DOD’s chief information officer, has released a memorandum directing the establishment of the Zero Trust Portfolio Management Office, or ZT
MoreThe Federal Risk and Authorization Management Program has begun soliciting public comments on a proposed standard designed to ensure that FedRAMP Authorized cloud service offerings use automated systems to continuously identify, analyze,
MoreThe Cybersecurity and Infrastructure Security Agency has highlighted the need for public-private partnerships to address the growing risks to cloud identity systems. In a blog post CISA posted Tuesday, Clayton Romans, associate
MoreThe Government Accountability Office has called on the Nuclear Regulatory Commission’s chief information officer, Scott Flanders, to address open recommendations related to cybersecurity and IT acquisitions. In a letter addressed to Flanders,
MoreThe Cybersecurity and Infrastructure Security Agency has appointed federal civilian leaders Jeff Conklin and Casie Antalis as chief security officer and program director of the Joint Cyber Coordination Group, or JCCG, respectively.
MoreArmy Lt. Gen. Paul Stanton, Defense Information Systems Agency director and commander of the Department of Defense Cyber Defense Command, has urged cyber professionals to shift from a reactive cyber incident response
More