Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The Federal Communications Commission has established a task force to deal with privacy and data protection, noting what it calls the era of always-on connectivity.
The Cyber Safety Review Board will investigate what agencies and industry can do to "strengthen identity management and authentication in the cloud.”
Federal CISO Chris DeRusha says using weak forms of identity authentication is like "driving without seatbelts."
Melissa Vice, the director of the Department of Defense’s Vulnerability Disclosure Program, said the 12-month voluntary pilot with defense contractors found vendors faces similar challenges as the department in securing their networks.
The NSA's top official says the highly secretive agency is looking at how much work it can do outside of a SCIF.
At a recent financial industry conference, the chairman of the Commodity Futures Trading Commission called for a shift in how organizations think about cybersecurity. She called for a change from an incident response mentality, to a resilience mentality.
Ever since the first Microsoft Word macro attack, documents have been a source of malware delivery. Thirty years later it's still a problem. Word documents, PDFs, photographs, spreadsheets, they all remain potent delivery mechanisms for hackers.
There's cybersecurity, and then there's cyberwarfare. My next guest is both an academic and a practitioner of cyber wargames. He's here to update us on the types of exercises going on right now in federal agencies.
The “AI Cyber Challenge” announced today will be a two-year effort with involvement from leading companies Anthropic, Google, Microsoft and OpenAI.
Daniel Ragsdale is joining the White House to help put the new cyber workforce and education strategy into action.
“Cross domain solutions” have long been a critical piece of securing those networks, with the technology serving as a sort of gatekeeper to keep out malware and other threats. But with agencies increasingly adopting cloud services for even classified data, the nature of the “cross-domain solutions” is evolving, too, according to John Meyer, vice president and general manager of software ventures at Arcfield.
Two of the most troublesome regimes in the world – those of North Korea and Russia – differ in many respects. But they have one thing in common, namely the use of cryptocurrencies to help finance certain activities.
Prioritizing cybersecurity from the start makes fundamental shifts like reallocating cyber roles and responsibilities manageable. The National Cybersecurity Strategy is ambitious and comprehensive, but it is critical that agencies meet these guidelines and help secure our software, data and national security.
Eric Goldstein, CISA’s executive assistant director for cybersecurity, said the agency’s first-ever cybersecurity strategic plan features three main goals and 30 measures of effectiveness.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.