The United States faces persistent cyber campaigns that threaten both public and private sectors, directly impacting the security and privacy…
On February 5, ICF announced that it has achieved Cybersecurity Maturity Model Certification (CMMC) Level 2. This certification confirms ICF’s…
On February 3, Trout Software, a provider of proxy-based security for Operational Technologies (OT) and legacy systems, and Carahsoft Technology Corp….
With computing systems in the Department of War and other federal agencies under constant threat, Leidos and RegScale are integrating Leidos’ UpHold Armor and RegScale’s Continuous Controls Monitoring…
On February 4, System High Corporation, a Ridgeline International company, announced that it has expanded support through a P2 Compliance…
On January 30, the National Security Agency (NSA) released Phase One and Phase Two of the Zero Trust Implementation Guidelines (ZIGs) to outline the…
On January 27, GCS Geospatial (GCS), with more than a decade of experience advancing the state of geospatial and remote…
On January 26, the Cyber AB announced the election of its officers to lead its board of directors in 2026-2027,…
On January 26, Booz Allen Hamilton announced the general availability of Vellox Reverser, a malware reverse engineering and threat intelligence product designed…
On January 22, the Chertoff Group announced the addition of three cybersecurity experts to its team of senior advisors. Michael Johnson,…











