Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The recently released National Cybersecurity Strategy will make lasting changes in our approach to cybersecurity and establishing resilience for the federal government as well as within critical infrastructure.
Transportation is taking a measured approach to ensuring new infrastructure projects feature cybersecurity requirements, or at the very least, cyber guidelines.
Richard Beutel, senior researcher at the George Mason Center for Government Contracting and founder of Cyrrus Analytics LLC, a leading cloud policy boutique, explains why the White House’s new cyber strategy threatens the use of commercial-off-the-shelf IT projects across the government.
Federal agencies and our nation’s critical infrastructure – such as energy, transportation systems, communications and financial services — are dependent on technology systems to carry out fundamental operations and to process, maintain and report vital information.
The 2023 National Cybersecurity Strategy is a momentous document that will have a lasting influence on the global digital ecosystem. One aspect of the strategy’s intent is to “reimagine cyberspace” as a tool to improve trust in the United States’ democratic institutions.
No one can predict when disaster will occur. But organizations, whether government or private, can control how well they respond. It is all about risk mitigation and resilience.
CISA has hired about 80 people through the "cyber talent management system," while FEMA is also about to start using CTMS.
22 of the 37 items on GAO’s list of vulnerable federal programs and broad government challenges stem from issues of mission-critical skills gaps in the federal workforce.
CBP is already moving forward with an effort to embed AI algorithms in screening technology, while CISA's director has raised concerns about the "weaponization" of tech.
Iranian hackers broke into to a system used by a U.S. municipal government to publish election results in 2020 but were discovered by cyber soldiers operating abroad and kicked out before an attack could be launched, according to U.S. military and cybersecurity officials. The system involved in the previously undisclosed breach was not for casting or counting ballots, but rather one that was used to report unofficial election results on a public website. The breach was revealed during a presentation Monday at the RSA Conference in San Francisco, which is focused on cybersecurity. Officials did not identify the municipality targeted.
IARPA's program manager explains how she hopes the research agency can make "human factors" a weakness of cyber attackers, too.
DoD will not be able to afford a fragmented security posture; its cyber analysts and defenders will need visibility across the entire cloud landscape, rather than having to swivel between separate instances. DoD will need a common picture of user identities, a common means of putting policy and protection onto endpoints, and a common defensive layer.
Understanding the value of compliance data science and using process debt as a cost figure, agencies will overcome resistance to change and improve the efficiency of their operations.
Companies and critical national infrastructure organizations at risk of cyberattack now need to take best practices from the military’s approach to training and readiness and apply the Cyber Flag construct to protect their critical assets.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.