News

Warfare now includes cyberspace as one of its main battlefronts. Meeting the challenge is the U.S. Cyber Command, which ...
Practical Steps to Approaching SOAR Deployment. DoD organizations will be best served by starting with a comprehensive SOAR strategy. Security leaders can confront the challenges (i.e., the ...
These four DOD cyber officials are securing comms, protecting sensitive data and ensuring the readiness of the U.S. armed forces.
One of the biggest, most complicated projects in the defense industrial base isn’t a new weapons system or cloud computing environment. It’s the Cybersecurity Maturity Model Certification (CMMC), ...
Defense-in-depth security is about combining technology components with best practice security management to create protective layers reducing the risk of attack and intrusion.
Defense Contractors and Subcontractors – Are you DoD Cyber Security Compliant? MONTPELIER, Vt. – The Vermont Procurement Technical Assistance Center (VT PTAC) will be hosting free workshops ...
The Department of Defense is "years behind" the private sector in implementing the use of artificial intelligence to help bolster its cybersecurity capabilities, a top official said Wednesday.
DOD Deputy Chief Information Officer for Cybersecurity David McKeown shared an update on the progress of CMMC version 2.0 at the Potomac Officers Club’s 2024 Cyber Summit.
Demystifying the DoD’s Cybersecurity Mandate. In 2021, the U.S. government spent nearly $19 billion on cybersecurity—with almost half of that funding allocated for the Department of Defense (DoD).