On September 1, 2024, the U.S. Army Cyber Corps turned ten years old. Some may chuckle at the thought of this branch still teetering on the verge of adolescence compared to the more grizzled veteran ...
The Army has awarded a contract to Seekr for deploying agentic artificial intelligence to identify "cyber, system and mission vulnerabilities" in weapon systems within the Army Combat Capabilities ...
Leidos has announced the integration of its UpHold Armor with RegScale’s Continuous Controls Monitoring (CCM) platform.
GSA quietly rolled out CMMC-like cybersecurity requirements, signaling a major shift in how federal contractors must protect ...
The United States continues to face one of the largest cybersecurity workforce gaps ever recorded, with more than 500,000 open cyber positions nationwide. Federal agencies, from CISA to the Department ...
The Department of Defense must find creative ways to bolster its cybersecurity workforce — while adhering to the White House’s mandate to reduce its headcount — if it hopes to thwart increasingly ...
In the digital age, the battlefield has expanded beyond physical realms to encompass cyber frontiers. The Department of ...
On September 10, 2025, the U.S. Department of Defense (DoD) published its final rule implementing the contractual requirements under the Cybersecurity Maturity Model Certification (CMMC) Program. The ...
WASHINGTON — Bringing innovative technologies to Soldiers and incorporating next generation software and capabilities will be among the priorities of the Army’s new top cyber strategist. Brandon Pugh ...
Personnel with the 175th Cyberspace Operations Group conduct cyber operations at Warfield Air National Guard Base, Middle River, Md., June 3, 2017. (U.S. Air Force photo by J.M. Eddins Jr.) The ...
What the latest government shutdown means for cybersecurity leaders, boards and organizations operating amid funding lapses, ...
The U.S. Department of Defense recently issued a final rule to implement the Cybersecurity Maturity Model Certification Program, and defense contractors will be subject to a variety of cybersecurity ...