Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
There’s wide consensus that SBOMs are a constructive building block for software supply chain security, perhaps especially for federal software supply chain security. But less appreciated is that there are different schools of thought on when the promises of SBOMs for federal government software supply chain security will be realized.
Agencies can automate a lot, but not the process of deciding who's right in workplace prohibited practices.
Katie Arrington, the former DoD chief information security officer for acquisition and sustainment, says dedicated funding is needed to address long-standing cyber problems in weapons systems.
Larry Allen, president of Allen Federal Business Partners, argues for why the General Services Administration’s Transactional Data Reporting effort needs more time and training of contracting officers.
In a cybersecurity context, “island-hopping” describes an advanced – and increasingly common – form of cyberattack.
The growing cybersecurity workforce gap is cause for serious concern, particularly when it comes to protecting government assets.
Joint All-Domain Command and Control (JADC2), the Defense Department’s initiative to synchronize the joint force across domains, is not a new idea.
Cryptocurrencies and other blockchain-based digital assets play an increasingly central role in financial markets. They’re also becoming a more frequent source of regulatory concern, as well as criminal activity.
There’s currently a significant debate about the appropriateness of using AI in combat. Over thirty nations are working through the U.N. to introduce a ban on autonomous AI weapons. There are similar discussions among some U.S. AI companies about whether their technology should be used in military applications, the highest profile of which was Google’s decision to not renew a contract with the Defense Department to perform image recognition.
The Technology Modernization Fund intends to spend its remaining $500 million — of the $1 billion allocated in the American Rescue Plan — by the end of the year.
Most people have heard of supercomputing. Most people have heard of quantum computing. While it might sound natural to assume that quantum computing is simply an evolution of supercomputing, they’re fundamentally different in key ways.
Mike Causey was not only a great journalist, he was also a great colleague.
Now more than a year past President Joe Biden’s Executive Order on Improving the Nation’s Cybersecurity, federal agencies are ramping up efforts to achieve its mandates, including building a zero trust architecture.
From industry to government agencies, the impacts of the Apache Log4j vulnerability have been felt globally. The U.S. public sector has become especially vulnerable due to the magnitude of applications within agencies’ networks, its lack of resources and funding, and its involvement in escalating foreign conflicts.