It's money they want - cyber criminals and fraudsters of all types. To get a better handle on the latest risks and mitigation strategies, the Association of Government Accountants and consultants Guidehouse surveyed AGA members.
Zero trust is the cybersecurity goal federal agencies have for their networks and data. It’s a policy requirement, and it’s an industry best practice. But zero trust is not something you buy, download and install. “Zero trust is really a security philosophy and approach that's built on a few core principles,” said Jason Garbis, the chief product officer for Appgate.
At the Education Department, Chief Information Security Officer Steven Hernandez said people’s concept of identity will need to evolve.
Cheryl Davis, senior director for Strategic Initiatives at Oracle, joined host Roger Waldron on Off the Shelf to discuss the many cybersecurity challenges facing contractors and the federal government.
The General Services Administration released a new cyber supply chain risk management strategy that focuses on three objectives as required by the Federal Acquisition Supply Chain Security Act of 2018.
The Justice Department recently refreshed policy for using a potent stick to prod federal contractors. Or maybe whack them upside the head. The Civil Cyber Fraud initiative's club is the False Claims Act.
Peter Chapman, CEO of IonQ joins host John Gilroy on this week's Federal Tech Talk to give an overview of quantum computing for federal information technology.
Rick Simon, the program manager for the Secure Cloud Management project and a contractor in the Defense Innovation Unit, said the office issued success memos to the three vendors who took part in the pilot program.
The agency says it doesn't want to reinvent the wheel in developing an approach to securing the broad information and communications technology ecosystem.
Constant monitoring combined with a security approach designed in line with how the cloud operates can keep government data and systems safe from compromise.
Forthcoming strategy looks beyond IT modernization, takes multiyear approach to also reform IT policies and personnel practices.
Katie Arrington had been DoD’s chief information security officer for acquisition and sustainment to the Undersecretary of Defense for Acquisition and Sustainment since 2020 and led the development of the Cybersecurity Maturity Model Certification (CMMC) program.
Secure Access Service Edge (SASE) is a holistic approach to protecting data, intellectual property and networks both in the cloud and on-prem.
Identity and access management, along with zero trust architecture and supply chain risk management, are key foundational points of the president’s cybersecurity executive order issued in May.
The Office of Management and Budget issued a new memo requiring agencies to assess their current status and plan for the future around end-point detection and response tools.