Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
NOAA’s broad spectrum of data formats across more than 90 business systems requires regular check on authorization and cyber health.
Read moreBuilding zero trust into agencies’ networks is on several IT modernization to-do lists through the federal government. But the term is so broad that it can often be misunderstood.
Analyst Chase Cunningham said the concept of zero trust means removing the potential for someone to be the person who causes a cybersecurity failure.
By minimizing access to applications based on requirements of the specific user, Zero Trust security removes the need to rely on the traditional boundaries of a network perimeter.
Here’s what we know about how a global IT outage, sparked by a faulty software update from cybersecurity firm CrowdStrike, is impacting federal agencies.
FSAFEDS enrollees will also soon have to transition to Login.gov and complete an identity verification to continue accessing their accounts.
The cloud security program launched two programs, an agile delivery pilot and a new technical documentation hub, to accelerate cloud authorizations.
An academic course endorsed by the Defense Department and delivered by accelerator company BMNT aims to help science and engineering students develop their idea
DHS cyber lead Iranga Kahangama also says the proposed cyber incident reporting rule is not “simply a land grab,” as some criticize it for being overly broad.
Many regulations require that companies working with national security information implement aggressive levels of cybersecurity.
An amendment in the Senate version of 2025 NDAA would “return decision-making power back to DoD components” to purchase cyber products and services.
Cybersecurity becomes almost a personal matter when you’re working in a war zone and information superiority is a must.