Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
This is the 17th year of Cybersecurity Awareness Month and Kevin Harris, cybersecurity program director at American Military University, says a lot has changed since those early days.
Read moreThe Defense Information Systems Agency moved its cloud based internet isolation program into production after testing it out for the last year under a $199 million Other Transaction Agreement.
David Waltermire, the technical lead for OSCAL at NIST, and Milica Green, a compliance subject matter expert with Telos Corporation, say the development and implementation of the Open Security Controls Assessment Language (OSCAL) will reduce the time, cost and challenges of FedRAMP certifications.
Cynthia Mendoza, the intelligence community’s chief architect, said the reference architecture framework is defining consistent, repeatable approaches to ensure security and interoperability among enterprise IT capabilities.
Here’s what we know about how a global IT outage, sparked by a faulty software update from cybersecurity firm CrowdStrike, is impacting federal agencies.
FSAFEDS enrollees will also soon have to transition to Login.gov and complete an identity verification to continue accessing their accounts.
The cloud security program launched two programs, an agile delivery pilot and a new technical documentation hub, to accelerate cloud authorizations.
An academic course endorsed by the Defense Department and delivered by accelerator company BMNT aims to help science and engineering students develop their idea
DHS cyber lead Iranga Kahangama also says the proposed cyber incident reporting rule is not “simply a land grab,” as some criticize it for being overly broad.
Many regulations require that companies working with national security information implement aggressive levels of cybersecurity.
An amendment in the Senate version of 2025 NDAA would “return decision-making power back to DoD components” to purchase cyber products and services.
Cybersecurity becomes almost a personal matter when you’re working in a war zone and information superiority is a must.