Jason Green, vice president Public Sector and Derek Weeks, vice president and DevOps Advocate at Sonatype join host John Gilroy on this weeks Federal Tech Talk to discuss open source software development and how their company can reduce cost and increase cybersecurity for federal agencies.
Joshua Spence, West Virginia’s Chief Technology Officer, discussed his organization, new IT initiatives and reflections on 15 months in office.
CISA’s emergency directive gives agencies mere days to assess the scope of the vulnerability to its systems, and 10 days to patch or remedy all its affected endpoints.
Federal cyber experts say the Homeland Security Department’s draft TIC 3.0 implementation guidance is well thought out and gives agencies the necessary leeway to find a secure way to the cloud.
The 2020 Defense authorization bill includes almost 1,800 pages and we found several important and interesting provisions that you should know about ranging from military cyber advisers to the possible return of lead system integrators.
Federal Drive with Tom Temin got more details from the chair of the Cybersecurity and Technology Program at the Aspen Institute, John Carlin.
Greg Wilshusen, the director of information security issues at GAO, said barriers still stand in the way of agencies sharing cyber threat information with each other and with their partners in the private sector.
SANS analyst David Hazar joined Federal Drive with Tom Temin for the details.
In today’s Federal Newscast, fraudsters expanded their tactics to kick off 2020 and the Social Security Administration continues to be a top target.
Dave McOmber, executive vice president Public Sector Federal Sales at QTS Data Centers and Jeff Groh, vice chairman Occupier Services JLL, join host John Gilroy on this week’s Federal Tech Talk to discuss what federal IT professionals should consider when choosing a data center.
The commission is looking at a strategy built around deterrence through punishment. If retaliation for cyber attacks are swift, decisive, consistent and public adversaries will be less likely to instigate attacks.
Recent tension between the U.S. and Iran have given CISA an opportunity to test its cyber threat intelligence-sharing capabilities in the new year.
The Air Force’s acquisition chief says the next frontier for bug bounties lies in the chips and embedded systems the Defense procurement process typically ignores.
The United States is preparing for retaliation from Iran, but what does that mean for federal employees?