Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The way you start to build a zero trust architecture is to work with the three horizontal pillars to define and restrict the protected surfaces around the data. If you can break into my IT architecture but cannot get to the data, I win; I’m not happy, but I still won. The answer is to reduce the protected surface for the data. Smaller is easier to manage and protect.
The National Institutes of Health (NIH) is planning to replace its decades-old legacy Electronic Health Record, and looking at how a new EHR could help accelerate its use of artificial intelligence.
The DoD CIO wrote a Risk Management Framework overlay for securing the overarching AI environment. It’s “vague about what to look for and how to do the security, but it’s a start,” said DoD CIO David McKeown.
Agencies have just over 24 hours to shut down any instances of affected Ivanti VPN products, per a new directive from CISA.
Ultimately, creating modern digital services depends on understanding the linkages between user experience, customer experience, employee experience and multi-experience. Are you ready to tackle TX at your agency? Here are the first three steps.
It's the oldest challenge in government and business: How to make things easier for customers. In the digital age, customer service has evolved into something more ambitious: customer experience (CX). CX asks, among other things, how you get the idea of better service or experience down to the individual employee.
Major changes to the 17th Federal IT Acquisition Reform Act (FITARA) scorecard led to agency scores dropping considerably.
Nakasone says one of the major challenges that needs addressing is how quickly military forces rotate in and out of CYBERCOM.
Illegal fishing harms the legal fishing industry and endangers the marine ecosystem. That is why the Coast Guard and other agencies spend so much time trying to detect and stop it. Now the National Geospatial Intelligence Agency is launching a prize challenge for data-based ways to get on top of illegal fishing.
A cloud computing security program established in 2011, continues to present difficulties to government and industry: FedRAMP, the Federal Risk and Authorization Management Program, is a way of establishing that cloud computing service companies are secure. But more than 12 years in, the program still has cost uncertainty. And agencies don't always use FedRAMP approved vendors, according to the Government Accountability Office.
DoD officials plan to have a call with the industry soon to clarify the latest FedRAMP equivalency memo.
HHS is moving toward a zero trust architecture, collecting information on where it may be vulnerable and refining its approach.
How do AI, cloud computing and analytics fit into creating a successful zero trust strategy?
Luis Lopez, the Education Department’s chief information officer, said the new customer advisory council is helping drive technology modernization decisions across the agency.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.