CMMC 2.0 is bringing compliance within reach of a wider range of DoD contractors and partner organizations. But success requires those who handle CUI to understand both the changes CMMC 2.0 is bringing, and how stronger encryption and other data protection measures can be deployed to help meet these new CMMC 2.0 compliance requirements.
The IRS has a detailed plan for achieving a state of zero trust on its information technology networks, which is something all agencies are under obligation to do for cybersecurity.
The Federal Communications Commission has established a task force to deal with privacy and data protection, noting what it calls the era of always-on connectivity.
The Cyber Safety Review Board will investigate what agencies and industry can do to "strengthen identity management and authentication in the cloud.”
Federal CISO Chris DeRusha says using weak forms of identity authentication is like "driving without seatbelts."
Melissa Vice, the director of the Department of Defense’s Vulnerability Disclosure Program, said the 12-month voluntary pilot with defense contractors found vendors faces similar challenges as the department in securing their networks.
The NSA's top official says the highly secretive agency is looking at how much work it can do outside of a SCIF.
At a recent financial industry conference, the chairman of the Commodity Futures Trading Commission called for a shift in how organizations think about cybersecurity. She called for a change from an incident response mentality, to a resilience mentality.
Ever since the first Microsoft Word macro attack, documents have been a source of malware delivery. Thirty years later it's still a problem. Word documents, PDFs, photographs, spreadsheets, they all remain potent delivery mechanisms for hackers.
There's cybersecurity, and then there's cyberwarfare. My next guest is both an academic and a practitioner of cyber wargames. He's here to update us on the types of exercises going on right now in federal agencies.
The “AI Cyber Challenge” announced today will be a two-year effort with involvement from leading companies Anthropic, Google, Microsoft and OpenAI.
Daniel Ragsdale is joining the White House to help put the new cyber workforce and education strategy into action.
“Cross domain solutions” have long been a critical piece of securing those networks, with the technology serving as a sort of gatekeeper to keep out malware and other threats. But with agencies increasingly adopting cloud services for even classified data, the nature of the “cross-domain solutions” is evolving, too, according to John Meyer, vice president and general manager of software ventures at Arcfield.
Two of the most troublesome regimes in the world – those of North Korea and Russia – differ in many respects. But they have one thing in common, namely the use of cryptocurrencies to help finance certain activities.
Prioritizing cybersecurity from the start makes fundamental shifts like reallocating cyber roles and responsibilities manageable. The National Cybersecurity Strategy is ambitious and comprehensive, but it is critical that agencies meet these guidelines and help secure our software, data and national security.