{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram

Army CISO Easley departs for role at the Pentagon

Maj. Gen. Matt Easley has stepped down from his role to join the Office of the Undersecretary of Defense for Policy as deputy principal information operations adviser. Billy Mitchell has the story.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

IRS to adopt Login.gov as user authentication tool

The Treasury says it is working with the General Services Administration to achieve the “security standards and scale” required to adopt the platform. John Hewitt Jones has the details.

CDC further expands use of Palantir's Tiberius platform

A new six-month contract to improve the CDC's decision making and operations across COVID-19 treatment areas. Dave Nyczepir has the story.

National Cyber Director Chris Inglis calls for 'new social contract' to redistribute risk

National Cyber Director Chris Inglis, writing in Foreign Affairs over the weekend with a senior adviser, said that the tech sector should make deeper investments in hardware and software security and the U.S. government should take a greater role in fostering digital defenses. Tim Starks has the story for CyberScoop.


WATCH: Adopting cloud to deliver geospatial intelligence to the world

By moving to the cloud, the National Geospatial-Intelligence Agency (NGA) was able to leverage a content distribution network to host data globally and provide access to safety information and intel to allied government users without disruptions. NGA Director of Cybersecurity Operations Center Chris Johnson highlights how the agency is implementing a service-oriented architecture to drive automation and rapidly respond to mission demands. Hear more from Johnson.


Securing applications is critical to securing the nation

Cyber threats seek entry points using sophisticated assault tactics, and legacy solutions are no longer enough to combat them. Attackers are also exploiting more publicly accessible targets like websites, web services, online forms and more. These applications are doorways leading to other systems and databases, and federal agencies are particularly at risk. A new report highlights how to close web application security gaps to keep public information and critical infrastructure secure. Read the full report.

Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}