Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
They have been a separate entity around the Pentagon for less than five years, taking on a variety of complex technical issues for different DoD groups. And their organizational structure is a lot like a Silicon Valley start-up.
Read moreOver the years, the DoD has been at the vanguard of ethical hacking and bug bounty programs, where the good guys find cybersecurity flaws in their systems and let them know.
The latest ransomware attack on Colonial Pipeline has some panicked Americans hoarding gasoline in plastic bags, leaving many to wonder how vulnerable U.S. companies and government entities are.
Alex Rice, the co-founder and chief technology officer at HackerOne, said over the last five years, DoD has identified more than 10,000 vulnerabilities through bug bounty and other similar programs.
DHS’s new Supply Chain Resilience Center will aim to marshal stakeholders to help avoid the type of shortages and bottlenecks that roiled the country during COVID-19.
The White House executive order on artificial intelligence gathered into one place all the concerns and cautions floating around for years. How to protect privacy in training data. How to avoid algorithmic bias. For more on how agencies can improve their AI game, Federal Drive Host Tom Temin spoke with the founder of the FAIR Institute, Nick Sanna.
The federal government’s made huge progress in reducing security clearance processing times over the last several years. But there are some early signs of backsliding. As Federal News Network reported last week, the latest data shows top secret investigations took an average of 115 days in the fourth quarter of fiscal 2023 – up from 84 days during the same period last year.
The Biden administration, in its push to improve customer experiences across government, is using data to pinpoint where those services aren’t meeting expectations.
While the Defense Department’s Replicator program will be successful if it is able to get 2,000 drones within two years, speakers at Georgetown University’s Center for Security and Emerging Technology said that the program will be more successful if this is not a one-time thing. DoD must replicate this initiative in the future whether it is with new drones or another technology to help move beyond the valley of death.
A proactive system of action aligns with the principles of good cyber hygiene. It ensures that organizations are not merely responsive but anticipatory, staying one step ahead of cyber adversaries. The dynamics of cyberspace dictate that agility is the need of the hour, and a comprehensive system that enables swift responses to emerging threats embodies this agility.
The head of the IRS’ cybersecurity operations says the Treasury agency is making progress on logging, multifactor authentication, and other aspects of “zero trust” security to help protect taxpayer data.
With nearly 50% of the government’s roughly two million civilian employees teleworking, the federal government continues to embrace digital transformation. And, just like organizations in the private sector, web browsers have emerged as essential tools…