It starts with federal agencies prioritizing observability strategies. Despite its growing popularity, observability is a fresh concept – one that can be difficult to define and see as a path to resilience without first understanding its foundation. The roots of observability can simply be traced down to a collection of logs, metrics and traces by which monitoring systems can more proactively mitigate potential threats.
"The worst thing would be if we suffered a serious cyber attack, and this position was vacant."
More often than not, legacy contracts and programs with existing providers and solutions are routinely extended. That may save time, but it also prevents the innovation and collaboration needed to address modern threats.
The Environmental Protection Agency's (EPA) Integrated Risk Information System (IRIS), is one of the main tools the agency relies on for environmental regulations, containing information on human health effects that may result from exposure to various chemicals in the environment. A new report from the EPA's inspector general, said the agency needs to do a better job of who has access to it. For more on the report, the Federal Drive with Tom Temin's Executive Producer Eric White talked with Jeremy Sigel, the IG office's Supervisory Audit Manager in the Information Resources Management Directorate.
As awareness of ransomware attacks grows, more and more organizations will be taking steps to protect their data. It’s possible that attackers could shift their approach to more destructive tactics, employing tactics that nation-state hackers have previously used to cripple industrial control systems and equipment.
As zero trust increasingly becomes the norm, especially in fed, not only can we expect to see more resilience, but a greater ROI in cybersecurity overall. We just have to continue to make progress on our zero trust plans with speed and transparency at the forefront of our collective approach.
No one will argue that their agency’s attack surface has shrunk — not in a hybrid multicloud world with users accessing surfaces from anywhere all the time. Discover expert advice on how ASM can help agencies reduce their vulnerabilities dynamically.
The rule will include key details on the "most ambitious cybersecurity conformity initiative ever attempted,”
The ability to automatically monitor for suspicious activity is also critical. Thanks to SBOMs, organizations can look at the specific technology they have deployed and determine what controls they need to put in place to mitigate potential attacks.
Growing numbers of federal employees are about to come under what's known as continuous vetting. Public databases automatically monitored by security officials to make sure you haven't been criminally charged or suddenly incurred large debt. Those with national security clearance are mostly under continuous vetting already. Now the Office of Personnel Management plans to expand that to feds with so-called non-sensitive public trust positions. How should agencies prepare? How should you prepare? For insight, Federal Drive Host Tom Temin spoke with the managing partner of the Tully Rinckey law firm, Dan Meyer.
Now that several agencies have special hiring authorities, a forthcoming proposal aims to bring 'equity' to the cyber recruiting landscape.
In today's Federal Newscast: The GSA is pouring $2 billion into sustainable construction projects. Data brokers are selling sensitive information like health and financial data of current and former military personnel. And Jane Rathbun is losing her "acting" title as the Navy Department's chief information officer.
Jeff Rezmovic, the nominee to serve as DHS CFO, wants to get the department's financial management off GAO's high-risk list once and for all.
DHS plans to use its own approach for evaluating contractor cybersecurity rather than adopting the Pentagon's CMMC program.
In today's Federal Newscast: The SEC is suing SolarWinds and its chief information security officer for "defrauding investors." The Pentagon prepares to launch an artificial intelligence pilot program. And spending on classified intelligence activities has taken a big jump to nearly $100 billion.