Agencies have just over 24 hours to shut down any instances of affected Ivanti VPN products, per a new directive from CISA.
Nakasone says one of the major challenges that needs addressing is how quickly military forces rotate in and out of CYBERCOM.
DoD officials plan to have a call with the industry soon to clarify the latest FedRAMP equivalency memo.
HHS is moving toward a zero trust architecture, collecting information on where it may be vulnerable and refining its approach.
How do AI, cloud computing and analytics fit into creating a successful zero trust strategy?
Luis Lopez, the Education Department’s chief information officer, said the new customer advisory council is helping drive technology modernization decisions across the agency.
“We’re not going to be able to create innumerable amounts of requirements for all potential applications of AI and machine learning," a NIST official said.
The national security community is stronger when users can take advantage of a connected foundation for secure innovation. But as classification levels for certain workloads increase, how can agencies ensure a seamless user experience while still protecting vital data and applications—and how should this work in an era of multicloud environments?
DIA is doing proactive inspections to make sure agencies are following cyber standards for securing the top-secret JWICS network.
DoD’s new guidance clarifies what FedRAMP equivalency means and requires cloud service providers handling controlled unclassified information to get a letter of attestation from a third-party organization that says they meet the FedRAMP Moderate baseline standards without plans of action and milestones.
This legislation comes at an opportune time: Cybercriminals are getting smarter by the day, carrying out more sophisticated attacks at a higher volume than ever before. As technologies like artificial intelligence continue to proliferate, and organizations become increasingly digitized, the risk of breaches resulting in material impact grows.
The 5th annual President’s Cup Cyber Competition is accepting teams and individual competitors in the annual “capture the flag” competition that also includes industrial control systems for the first time.
Start with your organization’s endpoints to secure users and data, recommends Cisco’s Peter Romness in a conversation with the Federal Drive’s Tom Temin. The same approach and tools can be applied to data on premise and in commercial clouds, he explains.
The Cybersecurity and Infrastructure Security Agency issued an emergency directive after software firm Ivanti discovered vulnerabilities in two widely-used products.
Some contractors are slowly reassessing spend in other areas of the company and applying larger budgets to future IT and cyber compliance. That way, the additional costs are not surprising once compliance is required.