www.darkreading.com Open in urlscan Pro
2606:4700::6811:7963  Public Scan

Submitted URL: http://app.wiredata.extrahop.com/e/er?utm_campaign=2022-q2-april-newsletter-general-dynamic-nam-emea-a&utm_medium=email&utm_sourc...
Effective URL: https://www.darkreading.com/remote-workforce/biden-requests-nearly-11b-for-federal-cybersecurity-spending?utm_campaign=2022-...
Submission: On April 14 via api from SE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Remote Workforce

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat USA - August 6-11 - Learn More
   
 * Black Hat Spring Trainings - June 13-16 - Learn More
   

Webinars
 * Understanding Cyber Attacks on Remote Workers
   May 10, 2022
 * Building and Maintaining an Effective IoT Cybersecurity Strategy
   May 17, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Remote Workforce

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat USA - August 6-11 - Learn More
   
 * Black Hat Spring Trainings - June 13-16 - Learn More
   

Webinars
 * Understanding Cyber Attacks on Remote Workers
   May 10, 2022
 * Building and Maintaining an Effective IoT Cybersecurity Strategy
   May 17, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Remote Workforce

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat USA - August 6-11 - Learn More
   
 * Black Hat Spring Trainings - June 13-16 - Learn More
   

Webinars
 * Understanding Cyber Attacks on Remote Workers
   May 10, 2022
 * Building and Maintaining an Effective IoT Cybersecurity Strategy
   May 17, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 
 3. 
 4. 

Event
Incorporating a Prevention Mindset into Threat Detection and Response | April 27
Webinar | <REGISTER NOW>
Event
PAM for the Extended Enterprise | April 19 Webinar | <REGISTER NOW>
Event
Network Security Approaches for a Multi-Cloud, Hybrid IT World | April 14
Webinar | <REGISTER NOW>
Event
Protecting Industrial Control Systems from Modern Threats | April 13 Webinar |
<REGISTER NOW>
PreviousNext

Remote Workforce

1 min read

article



BIDEN REQUESTS NEARLY $11B FOR FEDERAL CYBERSECURITY SPENDING

The administration's 2023 IT budget for civilian agencies includes $500 million
more for CISA.
Dark Reading Staff
Dark Reading
March 29, 2022
Source: Sean Pavone via Alamy Stock Photo
PDF


President Joe Biden's 2023 IT federal civilian budget proposal published this
week increases funding from $58.2 billion to $65.8 billion — including $11
billion in new funding for cybersecurity spending for fiscal 2023.



Some $2.5 billion of the cybersecurity budget is earmarked for the Cybersecurity
and Infrastructure Security Agency (CISA), nearly $500 million more than last
year.


"Cyber threats have become a top risk to delivering critical Government
services, and this Administration is committed to addressing root cause issues
and taking transformational steps to modernize Federal cybersecurity," Biden's
budget proposal said, according to a FedScoop report.

Biden issued a cybersecurity executive order in May 2021 amid national security
worries underscored by the Colonial Pipeline breach. The order
included strengthening threat information-sharing between the government and
private sector, ensuring better software security, and standardizing federal
incident response. 







Vulnerabilities/ThreatsAttacks/BreachesApplication Security
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.
Subscribe

More Insights
White Papers
 * 
   Improving Operations with AI-Assisted Cybersecurity
 * 
   Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity

More White Papers
Webinars
 * 
   Building an Effective Active Directory Security Strategy
 * 
   Building and Maintaining an Effective IoT Cybersecurity Strategy

More Webinars
Reports
 * 
   Rethinking Endpoint Security in a Pandemic and Beyond
 * 
   How Enterprises Are Securing the Application Environment

More Reports

Editors' Choice
Creating a Security Culture Where People Can Admit Mistakes
Karen Spiegelman, Features Editor, Dark Reading
Nearly 40% of Macs Left Exposed to 2 Zero-Day Exploits
Jai Vijayan, Contributing Writer
Why XDR As We Know It Will Fail
Andrew Maloney, COO and Co-Founder, Query.AI
10 Signs of a Good Security Leader
Joshua Goldfarb, Fraud Solutions Architect - EMEA and APCJ, F5
Webinars
 * Building an Effective Active Directory Security Strategy
 * Building and Maintaining an Effective IoT Cybersecurity Strategy
 * Building Security Into the Application Development Lifecycle
 * PAM for the Extended Enterprise: Enforcing privileged access in hybrid cloud
   environments
 * Incorporating a Prevention Mindset into Threat Detection and Response

More Webinars
White Papers
 * Improving Operations with AI-Assisted Cybersecurity
 * Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity
 * 2022 Insurance Industry Cyber Threat Landscape Report
 * 5 Reasons To Move your PKI Deployment to the Cloud
 * 2021 Gartner Market Guide for Managed Detection and Response Report

More White Papers

Events
 * Black Hat USA - August 6-11 - Learn More
 * Black Hat Spring Trainings - June 13-16 - Learn More
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV

More Events
More Insights
White Papers
 * 
   Improving Operations with AI-Assisted Cybersecurity
 * 
   Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity

More White Papers
Webinars
 * 
   Building an Effective Active Directory Security Strategy
 * 
   Building and Maintaining an Effective IoT Cybersecurity Strategy

More Webinars
Reports
 * 
   Rethinking Endpoint Security in a Pandemic and Beyond
 * 
   How Enterprises Are Securing the Application Environment

More Reports

DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2022 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept