Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
“We’re not going to be able to create innumerable amounts of requirements for all potential applications of AI and machine learning," a NIST official said.
The national security community is stronger when users can take advantage of a connected foundation for secure innovation. But as classification levels for certain workloads increase, how can agencies ensure a seamless user experience while still protecting vital data and applications—and how should this work in an era of multicloud environments?
DIA is doing proactive inspections to make sure agencies are following cyber standards for securing the top-secret JWICS network.
DoD’s new guidance clarifies what FedRAMP equivalency means and requires cloud service providers handling controlled unclassified information to get a letter of attestation from a third-party organization that says they meet the FedRAMP Moderate baseline standards without plans of action and milestones.
This legislation comes at an opportune time: Cybercriminals are getting smarter by the day, carrying out more sophisticated attacks at a higher volume than ever before. As technologies like artificial intelligence continue to proliferate, and organizations become increasingly digitized, the risk of breaches resulting in material impact grows.
The 5th annual President’s Cup Cyber Competition is accepting teams and individual competitors in the annual “capture the flag” competition that also includes industrial control systems for the first time.
Start with your organization’s endpoints to secure users and data, recommends Cisco’s Peter Romness in a conversation with the Federal Drive’s Tom Temin. The same approach and tools can be applied to data on premise and in commercial clouds, he explains.
The Cybersecurity and Infrastructure Security Agency issued an emergency directive after software firm Ivanti discovered vulnerabilities in two widely-used products.
Some contractors are slowly reassessing spend in other areas of the company and applying larger budgets to future IT and cyber compliance. That way, the additional costs are not surprising once compliance is required.
The CSRB is modeled after the National Transportation Safety Board, but some experts say the cyber board needs more independence and transparency.
Endpoint management and security is becoming more automated. But it requires using the most current data about network activity.
Zero trust takes a multi-disciplinary team, full visibility into your network data, and a dash of artificial intelligence.
Dakota State University might be lesser known than other cybersecurity academic hubs, but it has a solid relationship with the national security community.
Zero trust architectures must cover both users and applications, and extend from the core network to the edge, all while giving all users an equal experience.