The Office of Management and Budget asked agencies to submit data about how they are protecting their domains from distributed denial of service attacks after a Russian-based group claimed responsibility for two successful incidents.
For nearly a quarter century, the government has been coaxing industry to report cyber security incidents. Now it's the law, and the Cybersecurity and Infrastructure Security Agency has the task of writing the rules and making it happen. For one industry view of how it's going, the Federal Drive with Tom Temin spoke with the Information Technology Industry Council's Senior Director of Policy, Courtney Lang.
Multifactor authentication and identity are a major issues in front of the federal chief information security officer council.
In today's Federal Newscast: The Federal Energy Regulatory Commission gets high marks for its cybersecurity program. Watchdogs say mistakes and fraud led to telehealth overbilling during the pandemic. And DoD wants to know if the kids are doing all right.
For many years, federal agencies treated data as something to guard at all costs, resulting in redundant and disconnected systems across government.
Customer experience and cybersecurity, frequently considered separate disciplines, are actually closely connected. One simple reason is that leaving constituents’ identities and data open to purloining is not good user experience.
Federal agencies – along with most large organizations – are steadily moving to a new generation of technology in the deployment of software applications. Regular run-time code gave way to virtual machines, and now virtual is yielding to containerization managed under frameworks like Kubernetes. This methodology brings a new set of cybersecurity risks IT staffs must mitigate.
Federal technology executives around government were moving into new jobs, retiring or heading to the private sector over the last few months.
Groups are urging CISA to develop a common format or even a user-friendly web portal for reporting cybersecurity incidents to the government.
During this exclusive webinar, moderator Justin Doubleday will discuss cybersecurity best practices and zero trust architecture with agency and industry experts.
James Sumpter from the Air Force Research Laboratory said that AFRL is focusing on supporting current networks, including legacy and isolated enclave ones.
At the Institute of Critical Infrastructure Technology Awards Dinner and Gala on Nov. 10, 2022, the Federal Drive with Tom Temin caught up with Jen Easterly, the Director of the Cybersecurity and Infrastructure Security Agency.
The need for a skilled information technology and cybersecurity workforce is an issue raised at almost every gathering of federal agencies and industry leaders.
The Pentagon's much-anticipated zero trust strategy lays out an ambitious, detailed plan for how DoD will adopt a "never trust always verify" approach.