Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
In January 2022 the Office of Management and Budget published its M-22-09 memorandum on zero trust that mandated compliance with specific goals by the end of fiscal 2024.
SecOps teams must be able to determine what is blatantly spyware. The software is probably sending out specific information and capturing data. All this type of data — application, network and device information — must be correlated and analyzed for a better understanding of what’s going on within the entire IT infrastructure.
Section 752 of the Consolidated Appropriations Act of 2023 signals a new chapter in pursuing digital accessibility for federal agencies. The act requires federal agencies to meticulously report on the accessibility of their information and communication technology (ICT), creating an exigency that might still be unanticipated by many.
As a response to the spate of high-profile software supply chain attacks, including SolarWinds and Log4J, President Biden’s cybersecurity Executive Order 14028, released in 2021, signaled the beginning of the administration’s focus on software supply chain security. The executive order demonstrated the administration’s serious commitment to the issue and made clear to software companies that they had a vital role in maintaining security.
The White House’s National Cybersecurity Strategy is primarily written for and designed to guide federal government officials. Yet the latest release of the strategy is remarkable for the commitments it makes to the private sector on a range of cybersecurity issues.
As cyberattacks continue to grow both in number and sophistication, government agencies are struggling to keep up with the ever-evolving threat landscape.
Emily Murphy, the former administrator of the General Services Administration and now a senior fellow with the Center for Government Contracting at George Mason University, makes the case for why cost and pricing data at the main contract level is useless and burdensome.
As a best practice, commercial firms leverage their buying power when acquiring supplies and services to support business operations.
While it is not uncommon for Congress to intervene when federal programs are not serving the public interest, it is unfortunate that a new law must be considered to fix the misguided implementation of "eIVES."
Ransomware attacks are now a topline concern for businesses everywhere.
For decades, the U.S. Army's negligent handling, storage and disposal of toxic substances have been the source of enduring health repercussions.
Social media provides government agencies with a powerful tool to keep citizens informed and combat crises through channels that will reach the modern constituent.
To the CHCO community, congratulations for leaning in on strengthening human capital management in the federal government. The HR profession and public service are better for your sustained efforts.
Acquisition is more than a routine, if complicated, administrative process. It takes skill, collaboration and strategic thinking.