Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Federal agency technology and security professionals have increasing awareness of the dangers lurking in the components of the commercial software they buy and use. That, coupled with specific policy requirements in the administration’s Executive Order 14028, has made ensuring the safety of the software supply chain a top concern.
Read moreThe National Counterintelligence and Security Center (NCSC) leads counterintelligence for the national government. Among its myriad missions is securing the software supply chain. “My directorate is certainly concerned with the supply chain of all critical infrastructure, certainly the supply chain that the IC has to source from as well,” Jeanette McMillian, Assistant Director of NCSC’s Supply Chain and Cyber Directorate said on Federal Monthly Insights – Securing the Supply Chain.
In 2011, billionaire software developer and Netscape co-founder Marc Andreessen wrote a seminal article for the Wall Street Journal about “the software revolution.” He began the piece by proclaiming, “Software is eating the world.”
The Information Technology Industry Council (ITI) is a global advocate for technology, representing some of the world’s most-notable and innovative companies. ITI promotes public policies and industry standards that advance competition and innovation worldwide.
A new group within DoD seeks to track how well new technology makes its way to the troops.
Hanna Kim, who started as deputy director for Login.gov in January, will serve as its director starting in May. She will replace Dan Lopez-Braus.
Chief information security officers, in particular, face an uphill battle with compliance mandates.
The supplement to NIST’s digital identity guidelines could pave the way for agencies to adopt stronger multi-factor authentication methods.
Federal investigators have their hands full trying to spot all of the fraud schemes that cost the government billions of dollars every year.
GSA’s Alliant 3 contract includes an evaluation factor to encourage large businesses to meet with small firms in one of 11 emerging technology areas.
Cyber risk management is vital for protecting the nation’s data assets from cyber adversaries. Yet the Government Accountability Office uncovered security gaps in risk management as the agency analyzed the effectiveness of the 2023 National…
Charlie Armstrong, the chief information officer at FEMA, said two recent successful migrations of applications to the cloud demonstrates progress.