During this exclusive CISO Handbook webinar, moderator Justin Doubleday and guests Louis Koplin from the Department of the Navy and Michael Mestrovich from Rubrik will discuss zero trust progress and strategy moving forward at the Department of the Navy.
Risk comes in many different forms in today’s digital world. All organizations must manage the growing business risks associated with a dynamic and complex attack surface and cybersecurity threats.
Easy passwords like "Password 1 2 3 4." Multiple people with the same password. Inactive user accounts not closed. One-factor authentication. No password expiration.
It's 2023, and at least the Interior Department, thousands of employees use floppy-disk era passwords.
A panel of federal and industry experts describe each of their approaches to achieving a zero trust architecture to improve the security of systems and data.
It’s often said that the wheels of government move slowly, but the persistent rise in cyberattacks have greased the gears of government to finally move forward with some urgency to address this critical issue.
2023 promises to be an eventful year for federal cybersecurity teams. Already, we’ve welcomed in a new Congress, which is bound to introduce new cybersecurity legislation, especially following the signing of the $1.7 trillion omnibus spending bill in December.
The new directive carves out some exceptions, but tells agencies they should mostly be on the DotGov or DotMil domain.
Eric Crusius, a partner with Holland & Knight, explains how the cybersecurity compliance regime for contractors will continue to grow whether or not DoD finalizes CMMC
In today's Federal Newscast: Agencies are dragging their feet on some critical cybersecurity recommendations. GSA is expanding its data reporting initiative. And MREs of the future could be made from nothing more than water, air and energy.
Federal experts praised Rep. Nancy Mace (R-S.C.) for past legislative bipartisan efforts around quantum computing and federal cyber workforce.
Raj Iyer’s last day as the Army’s chief information officer is Feb. 10, after which he plans to return to industry but continue to support the service’s transformation efforts.
Cybersecurity in the private sector has long been a matter of collaboration. Companies and sectors worked with government to establish risk management approaches to what companies would ultimately decide to do. Our next guest believes that statements coming from the administration signal a move to cyber regulations, mandates and oversight.
The U.S. federal government has made incredible strides in modernizing its use of technology in recent years. From customer experience (CX) to cybersecurity and beyond, agencies have taken this critical challenge head on.
It might be the biggest thing in computing since the microprocessor. But quantum computing doesn't come with guaranteed security. Among the challenges, developing cryptography algorithms that resist quantum computing.