DIA is doing proactive inspections to make sure agencies are following cyber standards for securing the top-secret JWICS network.
DoD’s new guidance clarifies what FedRAMP equivalency means and requires cloud service providers handling controlled unclassified information to get a letter of attestation from a third-party organization that says they meet the FedRAMP Moderate baseline standards without plans of action and milestones.
This legislation comes at an opportune time: Cybercriminals are getting smarter by the day, carrying out more sophisticated attacks at a higher volume than ever before. As technologies like artificial intelligence continue to proliferate, and organizations become increasingly digitized, the risk of breaches resulting in material impact grows.
The 5th annual President’s Cup Cyber Competition is accepting teams and individual competitors in the annual “capture the flag” competition that also includes industrial control systems for the first time.
Start with your organization’s endpoints to secure users and data, recommends Cisco’s Peter Romness in a conversation with the Federal Drive’s Tom Temin. The same approach and tools can be applied to data on premise and in commercial clouds, he explains.
The Cybersecurity and Infrastructure Security Agency issued an emergency directive after software firm Ivanti discovered vulnerabilities in two widely-used products.
Some contractors are slowly reassessing spend in other areas of the company and applying larger budgets to future IT and cyber compliance. That way, the additional costs are not surprising once compliance is required.
The CSRB is modeled after the National Transportation Safety Board, but some experts say the cyber board needs more independence and transparency.
Endpoint management and security is becoming more automated. But it requires using the most current data about network activity.
Zero trust takes a multi-disciplinary team, full visibility into your network data, and a dash of artificial intelligence.
Dakota State University might be lesser known than other cybersecurity academic hubs, but it has a solid relationship with the national security community.
Zero trust architectures must cover both users and applications, and extend from the core network to the edge, all while giving all users an equal experience.
Join moderator Justin Doubleday, and agency and industry leaders to learn how agencies are implementing artificial intelligence and machine learning tools to enhance cybersecurity initiatives.
Matt House, the program manager for the CDM program at CISA, said the governmentwide dashboard is in a good place in terms of delivering quality data.
At its core, a zero-trust architecture (ZTA) follows one guiding principle: Trust no one. Unlike conventional models, where anything inside the network perimeter is trusted, ZTA considers all users and systems as potential threats. This means verifying every access attempt, regardless of whether the attempt originates inside or outside the network.