Like many agencies, DHS is trying to recruit new tech talent. But the agency also wants to advance professional development opportunities for its existing IT specialists.
NTIA is seeking a big budget boost this year, and some lawmakers want to bolster the agency's authorities over issues ranging from federal spectrum management to artificial intelligence accountability.
The NIST project is evolving as agencies look to more quickly adopt software while complying with security and privacy frameworks.
Cyber espionage of sensitive data has occurred over the past 20 years with increasing frequency. Threat actors, particularly those that are state-sponsored, launch persistent cyberattacks that target sensitive national security data.
Artificial intelligence has evolved from a basic tool to one of the most powerful resources available since the first chatbot ELIZA was deployed over five decades ago.
In today's Federal Newscast: Disabled veterans will soon see a cost-of-living adjustment in their benefits. In January, a data error exposed the personnel info of employees from several agencies. And lawmakers want updates on the growing problem of stolen mail.
The current cybersecurity compliance landscape may seem daunting to the average government contractor, particularly if you are in a start-up phase or of small or mid-sized stature. But by finding yourself here, you’re already taking the first step. By breaking your compliance efforts into smaller digestible chunks and by not reinventing the wheel, you are better positioning your organization for success come late 2024
The U.S. Patent and Trademark Office (USPTO) recently expanded a contract to improve the cybersecurity of its main databases, as well as move the agency to that all-important zero-trust architecture.
The recent drafts from National Institute of Standards and Technology around cybersecurity highlight important updates on where the government is moving on technology and the focus on increasing security against cyber threats.
Some things in life are certain. Death, taxes and, wait for it: updates to NIST cybersecurity documents.
Agency tech staffs must, by law and regulation, report cybersecurity breaches. But some industry surveys show that organizations do not always report breaches, because who wants their own head to roll?
Supply-chain cybersecurity might seem like and abstraction, until you are, say, NASA, and building new ground stations to support the multi-billion-dollar Artemis-to-Mars program.
The National Institute of Standards and Technology’s new draft update to Special Publication 800-171, Revision 3 takes into account a year’s worth of comments and data collection to make significant changes to the requirements.
During this exclusive CISO Handbook webinar, moderator Jason Miller and guest Elena Peterson, senior cyber security researcher at the Pacific Northwest National Laboratory will explore cybersecurity research and IT modernization initiatives at PNNL. In addition, moderator Justin Doubleday and guest Matt Lembright, director of federal applications at Censys, will provide an industry perspective.
Perhaps you have heard of CMMC, the Cybersecurity Maturity Model Certification program. Now in its 2.0 version, it is supposed to lay minimum cybersecurity standards on contractors doing business with the Defense Department.