GSA has also been working on Section 508 training after the assessment found a deficit of federal staff dedicated toward digital accessibility efforts.
Rebecca Sirmons is executive producer for NASA TV, she joined Federal News Network's Jared Serbu.
By all accounts, artificial intelligence is changing how organizations must approach cybersecurity. Not everyone is quite certain how. Now, a really big working group assembled by the Aspen Institute has come up with specific recommendations on dealing with AI in the cybersecurity context.
The way you start to build a zero trust architecture is to work with the three horizontal pillars to define and restrict the protected surfaces around the data. If you can break into my IT architecture but cannot get to the data, I win; I’m not happy, but I still won. The answer is to reduce the protected surface for the data. Smaller is easier to manage and protect.
The National Institutes of Health (NIH) is planning to replace its decades-old legacy Electronic Health Record, and looking at how a new EHR could help accelerate its use of artificial intelligence.
The DoD CIO wrote a Risk Management Framework overlay for securing the overarching AI environment. It’s “vague about what to look for and how to do the security, but it’s a start,” said DoD CIO David McKeown.
Agencies have just over 24 hours to shut down any instances of affected Ivanti VPN products, per a new directive from CISA.
Ultimately, creating modern digital services depends on understanding the linkages between user experience, customer experience, employee experience and multi-experience. Are you ready to tackle TX at your agency? Here are the first three steps.