Steve Grewal, vice president and CTO, Public Sector at Cohesity, joined host John Gilroy on this week's Federal Tech Talk to discuss data management and the IT challenges facing federal technology professionals.
The Defense Department is outlining the tools and capabilities it will need to stand up its zero-trust program office later this fall, and improve its overall cybersecurity posture.
The Department of Homeland Security is putting the collective force of its component agencies behind its latest 60-day cyber sprint focused on transportation security.
Deputy Attorney General Lisa Monaco announced the Justice Department will pursue cybersecurity related fraud by government contractors and grant recipients through the False Claims Act.
The National Defense Authorization Act is often a grab-bag of sorts for members looking to easily address other legislative priorities with a bill that's considered "must-pass" each year. Here are several provisions in the House-passed NDAA that are worth watching for federal employees.
The head of the National Insider Threat Task Force says agencies need to collaborate across cybersecurity and insider threat organizations.
The critical infrastructure Americans rely on every day for power, transportation, water, connectivity and more has reached a perfect storm of vulnerability.
The bill aims to ensure agencies and contractors are sharing information when they get hit by cyber attacks.
Getting ID and access management right is important for several reasons. Sean Frazier, the federal chief security officer at Okta points out that the ID and access management “plane” in systems is an attractive place for attackers to gain access to networks and data.
Chris Hughes, co-founder of Aquia, joined host John Gilroy on this week's Federal Tech Talk to discuss cloud security and enterprise architecture for federal systems.
GSA, OPM, Education and DHS received funding for IT modernization projects with a focus on cybersecurity and improving citizen services.
Todd Skinner and Matt Van Mater of Booz Allen Hamilton explain the steps agencies can take today and in the future to secure their critical software.
Facial recognition technology is becoming more and more prevalent at borders and airports.
CISA, NIST and other federal entities are collaborating to create a standardized set of procedures for responding to cyber vulnerabilities and attacks.