Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Although the exact definitions of zero trust may vary, for the 16th Air Force that means breaking traditional relationships.
Read moreThe federal government is getting closer to rolling out its Trusted Internet Connection 3.0 policy, and the Cybersecurity and Infrastructure Security Agency is laying the groundwork for agencies to begin using the program.
Chase Cunningham, Forrester Research vice president and principal analyst serving security and risk professionals, said he has seen nearly triple the attention paid to zero trust at agencies since this time last year.
NIST computer scientist Scott Rose said the publication is meant to help generate a “conceptual framework” for agencies and cybersecurity experts to apply zero trust principles within their enterprise.
The intelligence community is also pursuing initiatives in cloud computing, data management, zero trust cybersecurity and quantum-resistant encryption.
Not yet in effect, the Cybersecurity Maturity Model Certification program rule is now at the White House for review.
Guidehouse paid $7.6 million and Nan McKay & Associates paid $3.7 million to resovled claims that they violated the False Claims Act.
The new emerging technology prioritization framework will help determine which generative AI tools need to be pushed to the front of the line for approval.
CTMS hasn’t been the immediate shot in the arm some thought it would be, but DHS’s CIO says it’s a key part of the department’s future.
FSAFEDS is lifting a temporary suspension on reimbursement payments. But employees are expressing frustration with the lack of communication ahead of the pause.
To build a secure future, it is critical that the U.S. government invest in a resilient, defensible digital ecosystem.
The VA data systems affected by the ransomware attack are all now back online, but the downtime has created long backlogs that still need to be sorted out.