Agency tech staffs must, by law and regulation, report cybersecurity breaches. But some industry surveys show that organizations do not always report breaches, because who wants their own head to roll?
Supply-chain cybersecurity might seem like and abstraction, until you are, say, NASA, and building new ground stations to support the multi-billion-dollar Artemis-to-Mars program.
The National Institute of Standards and Technology’s new draft update to Special Publication 800-171, Revision 3 takes into account a year’s worth of comments and data collection to make significant changes to the requirements.
During this exclusive CISO Handbook webinar, moderator Jason Miller and guest Elena Peterson, senior cyber security researcher at the Pacific Northwest National Laboratory will explore cybersecurity research and IT modernization initiatives at PNNL. In addition, moderator Justin Doubleday and guest Matt Lembright, director of federal applications at Censys, will provide an industry perspective.
Perhaps you have heard of CMMC, the Cybersecurity Maturity Model Certification program. Now in its 2.0 version, it is supposed to lay minimum cybersecurity standards on contractors doing business with the Defense Department.
The Space Hour spoke with Bill Harrod, Public Sector CTO for Ivanti.
It's fair to say, federal agencies will never buy commercial cloud computing services from Chinese vendors.
The White House seeks to narrow the growing chasm between the immense power companies like Microsoft, Amazon, Google and Oracle wield over the country’s digital fortunes and the few tools the government has to ensure their cybersecurity practices keep more than their pocketbooks in mind.
The self-attestation form is where the rubber meets the road in the government's push to have its software vendors follow secure development practices.
While federal agencies search endlessly to hire people skilled in cybersecurity, local government might have a different way. How about enlisting volunteers to help protect critical infrastructure from cyber attacks. That's the idea behind a detailed set of recommendations from the law firm McDermott Will & Emery.
The government is grappling with the mechanics of addressing whether their software supply chain is secure. Download our new ebook to get a snapshot from leaders at CISA, the IT Industry Council and DoD’s National Counterintelligence and Security Center into current efforts.
The recently released National Cybersecurity Strategy will make lasting changes in our approach to cybersecurity and establishing resilience for the federal government as well as within critical infrastructure.
Transportation is taking a measured approach to ensuring new infrastructure projects feature cybersecurity requirements, or at the very least, cyber guidelines.
Richard Beutel, senior researcher at the George Mason Center for Government Contracting and founder of Cyrrus Analytics LLC, a leading cloud policy boutique, explains why the White House’s new cyber strategy threatens the use of commercial-off-the-shelf IT projects across the government.
Federal agencies and our nation’s critical infrastructure – such as energy, transportation systems, communications and financial services — are dependent on technology systems to carry out fundamental operations and to process, maintain and report vital information.