"We're working with our development teams and we're working with testing. And then we have a policy that covers all of that," said Young Bang.
Newer technologies like automation and AI may offer new solutions to this age-old cybersecurity problem, but they can also be double-edged swords.
"The real meat of CMMC is now finalized and out," said Eric Crusius, attorney at Holland Knight.
After 21 years of Cybersecurity Awareness Months, maybe it’s time to reconsider the burden we place on end users.
Final comments on a Defense Department cybersecurity rule are due today. The Cybersecurity Maturity Model Certification project is about to become a reality.
Are your making steady progress toward secure software development?
Cordell Schachter, the Transportation Department CIO, said the agency’s DevSecOps capabilities are maturing as part of its digital transformation effort.
The Pentagon has taken another big step forward to make CMMC a reality. DoD projects the requirements will start showing up in contracts by mid-2025.
Various industries are still dealing with the consequences of the July 2024 technology outage which led to a "blue screen of death" and extreme disruptions.
"We could view cybersecurity as an entry level problem, but it is probably more of an intermediate and advanced role problem," Keith Clement said.
The government needs to push the market in the direction of secure-by-design, including manufacturing, fielding and management of these new endpoints.
The Pentagon is also working with major cloud service providers like Microsoft and Google to evaluate their zero trust implementations.
Implementing zero trust requires a significant cultural shift within all levels of an agency, as zero trust does not start and stop with IT professionals.
Cybersecurity experts from the Army Software Factory, SSA and USCIS say letting developers drive security efforts drives up safety in code.
The Cybersecurity Collaboration Center director pursues whole-of-government approach to helping agencies and industry tackle global cyberthreats.