Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
They have been a separate entity around the Pentagon for less than five years, taking on a variety of complex technical issues for different DoD groups. And their organizational structure is a lot like a Silicon Valley start-up.
Read moreOver the years, the DoD has been at the vanguard of ethical hacking and bug bounty programs, where the good guys find cybersecurity flaws in their systems and let them know.
The latest ransomware attack on Colonial Pipeline has some panicked Americans hoarding gasoline in plastic bags, leaving many to wonder how vulnerable U.S. companies and government entities are.
Alex Rice, the co-founder and chief technology officer at HackerOne, said over the last five years, DoD has identified more than 10,000 vulnerabilities through bug bounty and other similar programs.
Here’s what we know about how a global IT outage, sparked by a faulty software update from cybersecurity firm CrowdStrike, is impacting federal agencies.
FSAFEDS enrollees will also soon have to transition to Login.gov and complete an identity verification to continue accessing their accounts.
Ideal collaboration will drive a continuous loop in which industry invests, develops and demonstrates with federal agency end user requirements top of mind.
The chairman of the Senate Intelligence Committee called the delays with the next-generation background investigation system a “disaster.”
DISA’s PEO for transport, which is essentially the internet for the Defense Department, is looking for capabilities that have lifespan standards.
NARA has approved limited exceptions to the electronic records deadline, but many agencies have shifted away from paper-based processes.
“Advana was like a victim of its own success — it scaled tremendously over the last few years.” said Radha Plumb.
The potency of AI and implementation of data enabled missions hinges on skilled talent.