Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
In May, DHS awarded its new CDM dashboard contract which was intended to bring better scalability, performance, visualization and analytics to agencies.
Read moreKevin Cox, CDM program manager at DHS, said the dashboard will give agencies better visualization when it comes to operationalizing their data.
The Small Business Administration, over the past few years, has implemented CDM by migrating programs to the cloud and noticed some surprising cybersecurity possibilities in the process.
Smartphones are an integral part of how companies and the government do business today, but keeping them protected can be a challenge.
The hackers were likely mapping the unidentified agency’s network, but “no evidence is available to confirm successful data exfiltration or lateral movement during either incident,” CISA says.
In today’s Federal Newscast: Sen. Tommy Tuberville (R-Ala.) has lifted his abortion-driven hold on military promotions. Job satisfaction at the Homeland Security Department has increased. And GAO blames staffing shortages for the failure of federal agencies to battle cyber attacks.
In the hopes of boosting employee retention, the Office of Personnel Management launched a new platform for agencies to advertise openings in a cyber workforce rotation program.
Starting sometime next year, companies that want to sell software to the government will need to sign new attestations – certifying that they have taken certain steps to make sure their software is secure. Earlier this month, the Cybersecurity and Infrastructure Security Agency released its latest draft of the form companies will need to submit. One of the biggest changes is the attestations will have to be signed by a company’s CEO. But there are several other updates, too. For more about them and get an industry perspective, Federal News Network Deputy Editor Jared Serbu talked with Leopold Wildenauer, the Senior Manager for Public Sector Policy at the Information Technology Industry Council.
A proactive system of action aligns with the principles of good cyber hygiene. It ensures that organizations are not merely responsive but anticipatory, staying one step ahead of cyber adversaries. The dynamics of cyberspace dictate that agility is the need of the hour, and a comprehensive system that enables swift responses to emerging threats embodies this agility.
The head of the IRS’ cybersecurity operations says the Treasury agency is making progress on logging, multifactor authentication, and other aspects of “zero trust” security to help protect taxpayer data.
With nearly 50% of the government’s roughly two million civilian employees teleworking, the federal government continues to embrace digital transformation. And, just like organizations in the private sector, web browsers have emerged as essential tools…
CISA has released a new secure software attestation form, and it will require the attention at the highest levels of a company.