Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
As awareness of ransomware attacks grows, more and more organizations will be taking steps to protect their data. It’s possible that attackers could shift their approach to more destructive tactics, employing tactics that nation-state hackers have previously used to cripple industrial control systems and equipment.
As zero trust increasingly becomes the norm, especially in fed, not only can we expect to see more resilience, but a greater ROI in cybersecurity overall. We just have to continue to make progress on our zero trust plans with speed and transparency at the forefront of our collective approach.
No one will argue that their agency’s attack surface has shrunk — not in a hybrid multicloud world with users accessing surfaces from anywhere all the time. Discover expert advice on how ASM can help agencies reduce their vulnerabilities dynamically.
The rule will include key details on the "most ambitious cybersecurity conformity initiative ever attempted,”
The ability to automatically monitor for suspicious activity is also critical. Thanks to SBOMs, organizations can look at the specific technology they have deployed and determine what controls they need to put in place to mitigate potential attacks.
Growing numbers of federal employees are about to come under what's known as continuous vetting. Public databases automatically monitored by security officials to make sure you haven't been criminally charged or suddenly incurred large debt. Those with national security clearance are mostly under continuous vetting already. Now the Office of Personnel Management plans to expand that to feds with so-called non-sensitive public trust positions. How should agencies prepare? How should you prepare? For insight, Federal Drive Host Tom Temin spoke with the managing partner of the Tully Rinckey law firm, Dan Meyer.
Now that several agencies have special hiring authorities, a forthcoming proposal aims to bring 'equity' to the cyber recruiting landscape.
In today's Federal Newscast: The GSA is pouring $2 billion into sustainable construction projects. Data brokers are selling sensitive information like health and financial data of current and former military personnel. And Jane Rathbun is losing her "acting" title as the Navy Department's chief information officer.
Jeff Rezmovic, the nominee to serve as DHS CFO, wants to get the department's financial management off GAO's high-risk list once and for all.
DHS plans to use its own approach for evaluating contractor cybersecurity rather than adopting the Pentagon's CMMC program.
In today's Federal Newscast: The SEC is suing SolarWinds and its chief information security officer for "defrauding investors." The Pentagon prepares to launch an artificial intelligence pilot program. And spending on classified intelligence activities has taken a big jump to nearly $100 billion.
There is now more cyber guidance than ever for the companies that do business with the government. You can also expect even more when it comes to other new technologies, like artificial intelligence. Congress seems to be back up and running, and there is business to attend to. To start with, reauthorizing a major component of the Homeland Security Department, and also funding the rest of the government. For analysis, Federal Drive Executive Eric White spoke with Stephanie Kostro, Executive Vice President at the Professional Services Council.
In the fierce competition for cyber talent, a new study shows why agencies will need to develop innovative recruiting and retention programs, while also expanding pathways into the cyber workforce.
It’s never just one strategy, tactic or technology when it comes to cybersecurity. It’s a constant evolution that must simultaneously include investments in people, policy and tech. Get pointers from CISA, DARPA, IRS, ONCD and OPM in our new ebook.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.