Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Vulnerability disclosure has proliferated across federal agencies in recent years. A new House bill would make them mandatory for contractors, too.
During this webinar, top government information security executives and industry experts will reflect on their accomplishments along with the people and technology that made these programs so successful.
CMMC 2.0 is bringing compliance within reach of a wider range of DoD contractors and partner organizations. But success requires those who handle CUI to understand both the changes CMMC 2.0 is bringing, and how stronger encryption and other data protection measures can be deployed to help meet these new CMMC 2.0 compliance requirements.
The IRS has a detailed plan for achieving a state of zero trust on its information technology networks, which is something all agencies are under obligation to do for cybersecurity.
The Federal Communications Commission has established a task force to deal with privacy and data protection, noting what it calls the era of always-on connectivity.
The Cyber Safety Review Board will investigate what agencies and industry can do to "strengthen identity management and authentication in the cloud.”
Federal CISO Chris DeRusha says using weak forms of identity authentication is like "driving without seatbelts."
Melissa Vice, the director of the Department of Defense’s Vulnerability Disclosure Program, said the 12-month voluntary pilot with defense contractors found vendors faces similar challenges as the department in securing their networks.
The NSA's top official says the highly secretive agency is looking at how much work it can do outside of a SCIF.
At a recent financial industry conference, the chairman of the Commodity Futures Trading Commission called for a shift in how organizations think about cybersecurity. She called for a change from an incident response mentality, to a resilience mentality.
Ever since the first Microsoft Word macro attack, documents have been a source of malware delivery. Thirty years later it's still a problem. Word documents, PDFs, photographs, spreadsheets, they all remain potent delivery mechanisms for hackers.
There's cybersecurity, and then there's cyberwarfare. My next guest is both an academic and a practitioner of cyber wargames. He's here to update us on the types of exercises going on right now in federal agencies.
The “AI Cyber Challenge” announced today will be a two-year effort with involvement from leading companies Anthropic, Google, Microsoft and OpenAI.
Daniel Ragsdale is joining the White House to help put the new cyber workforce and education strategy into action.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.