Agency spending on blockchain is a tiny fraction of total technology spending. But it's important and growing, according to analysis by Deltek, a company focused on delivering software and information solutions.
Contractors will, somehow, be living under it, and there's still time to comment on it: The revision to NIST special publication 800-171 on protection of controlled, unclassified information. That's not the only cyber policy affecting contractors.
As a response to the spate of high-profile software supply chain attacks, including SolarWinds and Log4J, President Biden’s cybersecurity Executive Order 14028, released in 2021, signaled the beginning of the administration’s focus on software supply chain security. The executive order demonstrated the administration’s serious commitment to the issue and made clear to software companies that they had a vital role in maintaining security.
More than half of all federal agencies now automatically report into the CDM dashboard.
The White House’s National Cybersecurity Strategy is primarily written for and designed to guide federal government officials. Yet the latest release of the strategy is remarkable for the commitments it makes to the private sector on a range of cybersecurity issues.
House lawmakers showed little support to provide more funding for the Technology Modernization Fund in fiscal 2024, but the board still has hundreds of millions of dollars to loan out.
In today's Federal Newscast: GSA is making it easier for agencies to find Native American companies to contract with, thanks to a new online tool. CISA adds new faces to its top leadership team's cybersecurity division. And a collaboration between U.S. Cyber Command and industry that helps defend against cyber attacks is expanding.
As cyberattacks continue to grow both in number and sophistication, government agencies are struggling to keep up with the ever-evolving threat landscape.
During this exclusive CISO Handbook webinar, moderator Justin Doubleday and guest Benjamin Koshy of the Indian Health Service will explore cybersecurity initiatives and modernization at IHS. In addition, Torsten George of Absolute Software will provide an industry perspective.
The Federal Acquisition Regulation Council earlier this month issued something the procurement community had been expecting. An interim rule that bans the TikTok app from certain contractor devices.
Ransomware attacks are now a topline concern for businesses everywhere.
The budget guidance hews closely to the National Cyber Strategy, directing agencies to continue to focus their resources on "zero trust" architectures, as well as requirements for critical infrastructure.
The CISA guidance helps fill a void where agencies have lacked common security standards and configurations for widely used services, like email and productivity capabilities.
The "non-recurring expenses fund" doesn't have a flashy name, but it could become a "significant tool" for DHS to make both IT and facilities improvements.
As law enforcement and national security agencies adopt cloud services, their sensitivity to cyber incidents makes executing cybersecurity basics and transformational approaches in tandem essential. We share advice from two Trend Micro experts.