The FITARA scorecard continues to be a point of contention between Oversight and Accountability Subcommittee on cyber and IT leaders.
Officials at the VA and Treasury say CISA should offer more centralized support to agencies through its cyber services and the Joint Cyber Defense Collaborative.
The recent National Defense Industrial Strategy highlighted the erosion of U.S. industry's capacity for making things, which includes printed circuit boards (PCB) at the complex end of electronics. Now there are signs the domestic PCB industry is awakening.
Dem. lawmakers ask GAO to assess damage done to military by Sen. Tommy Tuberville (R-Ala.). The biggest CIA leak ever gets an ex-employee a 40-year sentence.
By all accounts, artificial intelligence is changing how organizations must approach cybersecurity. Not everyone is quite certain how. Now, a really big working group assembled by the Aspen Institute has come up with specific recommendations on dealing with AI in the cybersecurity context.
The way you start to build a zero trust architecture is to work with the three horizontal pillars to define and restrict the protected surfaces around the data. If you can break into my IT architecture but cannot get to the data, I win; I’m not happy, but I still won. The answer is to reduce the protected surface for the data. Smaller is easier to manage and protect.
The DoD CIO wrote a Risk Management Framework overlay for securing the overarching AI environment. It’s “vague about what to look for and how to do the security, but it’s a start,” said DoD CIO David McKeown.
Agencies have just over 24 hours to shut down any instances of affected Ivanti VPN products, per a new directive from CISA.
Nakasone says one of the major challenges that needs addressing is how quickly military forces rotate in and out of CYBERCOM.
DoD officials plan to have a call with the industry soon to clarify the latest FedRAMP equivalency memo.
HHS is moving toward a zero trust architecture, collecting information on where it may be vulnerable and refining its approach.
How do AI, cloud computing and analytics fit into creating a successful zero trust strategy?
Luis Lopez, the Education Department’s chief information officer, said the new customer advisory council is helping drive technology modernization decisions across the agency.
“We’re not going to be able to create innumerable amounts of requirements for all potential applications of AI and machine learning," a NIST official said.
The national security community is stronger when users can take advantage of a connected foundation for secure innovation. But as classification levels for certain workloads increase, how can agencies ensure a seamless user experience while still protecting vital data and applications—and how should this work in an era of multicloud environments?