It’s time for agencies to understand and take actionable steps to implement zero trust to safeguard against modern cyber-attacks as well as comply with new regulations.
In this exclusive webinar, technology executives from the Cybersecurity and Infrastructure Security Agency, Department of Health and Human Services, Fidelis Cybersecurity, Forcepoint and Forward Networks will elaborate on their zero trust efforts.
For businesses and organizations, achieving true zero trust architecture means looking toward identity-based solutions that are flexible and can support the work-from-anywhere environment.
Malware, like ransomware and spyware, is rampant in federal networks. With mobile security as the Achilles heel of Zero Trust, mobile event logging can be a preventive care measure protecting federal network digital health.
Janek Claus, director of Application Development at Sev1Tech, offered some remedies for this significant issue to host John Gilroy on this week's Federal Tech Talk.
The White House said Kurt DelBene will be the nominee to be the assistant secretary for information and technology and CIO at the Department of Veterans Affairs.
Maj. Gen. Matthew Easley, director, cybersecurity and chief information security officer, and the Army’s chief information officer, said it is key cybersecurity professionals use five functions.
The Pentagon is revising its Cybersecurity Maturity Model Certification program by massively reducing the amount of companies that would require third-party assessments and providing new waiver processes for select requirements.
Now tech vendor Cisco reports a sharp rise in the use of biometrics and other forms of multi-factor login, and greater interest by IT executives to move past passwords altogether.
CISA is directing agencies to address hundreds of known cyber exploits under a new process where the agency will regularly update a catalog of known vulnerabilities for priority patching.
EO 14028 calls for changing contracting language to require greater data storage and logging as a way to improve the sharing of threat information between service providers and federal partners.
More people are teleworking permanently, more paperwork is undergoing automation and there is more adoption of the latest cybersecurity strategies.
The Defense Information Systems Agency annual forecast to industry day highlighted several upcoming contract opportunities, but more importantly laid out the path the agency is heading for the next year.
The CDO office is less than a year old, but DISA officials want to put data at the center of everything the agency does going forward.
With the rise of ransomware attacks, it's clear the cybersecurity threat in general continues to rise. And so does the shortage of cybersecurity talent to help take it on.