www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7963
Public Scan
Submitted URL: http://app.wiredata.extrahop.com/e/er?utm_campaign=2022-q2-april-newsletter-general-dynamic-nam-emea-a&utm_medium=email&utm_sourc...
Effective URL: https://www.darkreading.com/remote-workforce/biden-requests-nearly-11b-for-federal-cybersecurity-spending?utm_campaign=2022-...
Submission: On April 14 via api from SE — Scanned from DE
Effective URL: https://www.darkreading.com/remote-workforce/biden-requests-nearly-11b-for-federal-cybersecurity-spending?utm_campaign=2022-...
Submission: On April 14 via api from SE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Understanding Cyber Attacks on Remote Workers May 10, 2022 * Building and Maintaining an Effective IoT Cybersecurity Strategy May 17, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Understanding Cyber Attacks on Remote Workers May 10, 2022 * Building and Maintaining an Effective IoT Cybersecurity Strategy May 17, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Understanding Cyber Attacks on Remote Workers May 10, 2022 * Building and Maintaining an Effective IoT Cybersecurity Strategy May 17, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. 4. Event Incorporating a Prevention Mindset into Threat Detection and Response | April 27 Webinar | <REGISTER NOW> Event PAM for the Extended Enterprise | April 19 Webinar | <REGISTER NOW> Event Network Security Approaches for a Multi-Cloud, Hybrid IT World | April 14 Webinar | <REGISTER NOW> Event Protecting Industrial Control Systems from Modern Threats | April 13 Webinar | <REGISTER NOW> PreviousNext Remote Workforce 1 min read article BIDEN REQUESTS NEARLY $11B FOR FEDERAL CYBERSECURITY SPENDING The administration's 2023 IT budget for civilian agencies includes $500 million more for CISA. Dark Reading Staff Dark Reading March 29, 2022 Source: Sean Pavone via Alamy Stock Photo PDF President Joe Biden's 2023 IT federal civilian budget proposal published this week increases funding from $58.2 billion to $65.8 billion — including $11 billion in new funding for cybersecurity spending for fiscal 2023. Some $2.5 billion of the cybersecurity budget is earmarked for the Cybersecurity and Infrastructure Security Agency (CISA), nearly $500 million more than last year. "Cyber threats have become a top risk to delivering critical Government services, and this Administration is committed to addressing root cause issues and taking transformational steps to modernize Federal cybersecurity," Biden's budget proposal said, according to a FedScoop report. Biden issued a cybersecurity executive order in May 2021 amid national security worries underscored by the Colonial Pipeline breach. The order included strengthening threat information-sharing between the government and private sector, ensuring better software security, and standardizing federal incident response. Vulnerabilities/ThreatsAttacks/BreachesApplication Security Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe More Insights White Papers * Improving Operations with AI-Assisted Cybersecurity * Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity More White Papers Webinars * Building an Effective Active Directory Security Strategy * Building and Maintaining an Effective IoT Cybersecurity Strategy More Webinars Reports * Rethinking Endpoint Security in a Pandemic and Beyond * How Enterprises Are Securing the Application Environment More Reports Editors' Choice Creating a Security Culture Where People Can Admit Mistakes Karen Spiegelman, Features Editor, Dark Reading Nearly 40% of Macs Left Exposed to 2 Zero-Day Exploits Jai Vijayan, Contributing Writer Why XDR As We Know It Will Fail Andrew Maloney, COO and Co-Founder, Query.AI 10 Signs of a Good Security Leader Joshua Goldfarb, Fraud Solutions Architect - EMEA and APCJ, F5 Webinars * Building an Effective Active Directory Security Strategy * Building and Maintaining an Effective IoT Cybersecurity Strategy * Building Security Into the Application Development Lifecycle * PAM for the Extended Enterprise: Enforcing privileged access in hybrid cloud environments * Incorporating a Prevention Mindset into Threat Detection and Response More Webinars White Papers * Improving Operations with AI-Assisted Cybersecurity * Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity * 2022 Insurance Industry Cyber Threat Landscape Report * 5 Reasons To Move your PKI Deployment to the Cloud * 2021 Gartner Market Guide for Managed Detection and Response Report More White Papers Events * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV More Events More Insights White Papers * Improving Operations with AI-Assisted Cybersecurity * Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity More White Papers Webinars * Building an Effective Active Directory Security Strategy * Building and Maintaining an Effective IoT Cybersecurity Strategy More Webinars Reports * Rethinking Endpoint Security in a Pandemic and Beyond * How Enterprises Are Securing the Application Environment More Reports DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept