Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
A sloppy cyber risk assessment can lead to misallocation of resources, false positives and an unrealistic sense of security at federal agencies, says Larry Clinton of the Internet Security Alliance.
Read moreArlette Hart, senior cybersecurity technologist at Leidos, joined Federal News Network to discuss the state of cybersecurity today and the need to recruit and retain top talent.
October is the 14th annual National Cybersecurity Awareness Month at DHS and this year, strengthening the workforce is top of mind.
INSA praises new plans of action from DoD and the White House that could help send a clear message to potential attackers that cyberthreats will be deterred in real-time.
Starting sometime next year, companies that want to sell software to the government will need to sign new attestations – certifying that they have taken certain steps to make sure their software is secure. Earlier this month, the Cybersecurity and Infrastructure Security Agency released its latest draft of the form companies will need to submit. One of the biggest changes is the attestations will have to be signed by a company’s CEO. But there are several other updates, too. For more about them and get an industry perspective, Federal News Network Deputy Editor Jared Serbu talked with Leopold Wildenauer, the Senior Manager for Public Sector Policy at the Information Technology Industry Council.
A proactive system of action aligns with the principles of good cyber hygiene. It ensures that organizations are not merely responsive but anticipatory, staying one step ahead of cyber adversaries. The dynamics of cyberspace dictate that agility is the need of the hour, and a comprehensive system that enables swift responses to emerging threats embodies this agility.
The head of the IRS’ cybersecurity operations says the Treasury agency is making progress on logging, multifactor authentication, and other aspects of “zero trust” security to help protect taxpayer data.
With nearly 50% of the government’s roughly two million civilian employees teleworking, the federal government continues to embrace digital transformation. And, just like organizations in the private sector, web browsers have emerged as essential tools…
CISA has released a new secure software attestation form, and it will require the attention at the highest levels of a company.
The Office of Personnel Management faces a tight deadline to set up a new health insurance marketplace for Postal Service employees and retirees to enroll in new plans, starting next year.
It starts with federal agencies prioritizing observability strategies. Despite its growing popularity, observability is a fresh concept – one that can be difficult to define and see as a path to resilience without first understanding its foundation. The roots of observability can simply be traced down to a collection of logs, metrics and traces by which monitoring systems can more proactively mitigate potential threats.
“The worst thing would be if we suffered a serious cyber attack, and this position was vacant.”