Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Although there’s some disagreement over when agencies will actually start benefitting from them, many agencies are currently laying the foundation to start using SBOMs.
Read moreChris DeRusha, the federal chief information security officer, said the focus on securing commercial software comes from the cyber executive order.
As federal agencies and contractors come to grips with the burden of protecting their software supply chain, understanding who had a hand in the development of their software products has taken on increasing importance. It comes down to pedigree. Where did your software come from? Was it domestic or international? Who had a hand in developing it?
In the federal software world, supply chains are often extensive. How can an agency ensure its risk assessments can adequately gauge potential threats? The Federal Drive’s Tom Temin asks just that of RiskRecon cyber expert John Ehret.
A cross-agency team focused on how the federal government can improve public-facing services online is looking at text messages as the new frontier for better customer experience.
By the end of fiscal 2024, all federal employees in “non-sensitive public trust positions” will be subject to more regular background checks.
For government leaders, a mindset shift towards being post-digital will create more strategic opportunities for better meeting the mission. Having ubiquitous and autonomous data doing all of the work on the back-end, it will be easier to create individualized and on-demand services for addressing any constituent need.
Cyber companies were left holding the bag of bid and proposals costs to the tune of hundreds of thousands of dollars when the Air Force abruptly cancelled a huge multiple award contract.
Andre Mendes, the chief information officer at the Department of Commerce, was one of several agency technology executives pushing for more consistency around cyber metrics under the FITARA scorecard.
In the rapidly evolving landscape of wireless communications, O-RAN presents a disruptive innovation that is driving transformation. By fostering a more competitive environment, O-RAN is facilitating the development of more innovative, efficient and cost-effective solutions, setting the stage for the next era of wireless connectivity.
As the government continues to modernize, zero trust remains a top priority. Agencies can leverage this potential influx of funding to make strategic investments that achieve zero trust goals.
Recently, MITRE and the Cybersecurity and Infrastructure Security Agency (CISA) released the Open-Sourced Extension of MITRE’s Caldera platform, specifically for operational technology. This is meant to be utilized by security teams to run automated adversary emulation exercises that are specifically focused on threats to operational technology.