Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
It’s designed to develop and purchase large, expensive weapons systems while holding to the tenets of competition, transparency and integrity, but that means it can’t keep up with cybersecurity defense.
Read moreGAO found that most CFO Act agencies still have major weaknesses in information security areas like access control, and have not implemented hundreds of GAO and IG recommendations.
The Navy has to figure out how to harness, organize and deliver its data to users before it can start utilizing that data for decision making.
Federal information technology executives are tasked with managing the data inundation and cyber threats they encounter on a daily basis, often with limited resources, both from a budgetary and skilled personnel perspective. Federal News Radio recently spoke with Steve Hull, chief information officer at Leidos, to address these issues and more.
Matthew Isnor, who leads cyber workforce development in DoD’s CIO’s office, said a new policy expands the number of job categories in the cyber workforce.
The Defense Counterintelligence and Security Agency is one of the federal government’s newest HISP agencies.
The New Hampshire and Maine cyber leaders say using the StateRAMP cloud security shared service accelerates their digital transformation efforts.
Everyone knows that Software bills of material (SBOMS) are crucial to cybersecurity. But deciphering these documents has been a challenge for many agencies.
You hear a lot about zero trust controls in government tech circles. Could this approach to cybersecurity be applied to protecting space assets?
State chief information officers say cloud services provide as good or better security than on-premise infrastructure, NASCIO research finds.
Chief information security officers, in particular, face an uphill battle with compliance mandates.
The supplement to NIST’s digital identity guidelines could pave the way for agencies to adopt stronger multi-factor authentication methods.