Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
John Fanguy, the federal chief technology officer for cybersecurity at Micro Focus Government Solutions, said agencies can prepare for the next cyber attack and ensure their missions are resilient by taking several important steps, starting with implementing Trusted Internet Connections (TIC) 3.0.
The legislation would grant limited immunity to give companies an incentive to report, and require these disclosures to anonymize personally identifiable information. Warner said these disclosures would provide an “early warning system” across government and private-sector owners of critical infrastructure.
Kevin Walsh, a director on the Government Accountability Office's IT and cybersecurity team, had the latest on GAO's High Risk List on Federal Drive with Tom Temin.
Although vulnerabilities stemming from both companies software were present on hundreds of DoD systems, officials say there's no evidence that cyber adversaries actually exploited them.
The threats will only become more sophisticated, multifaceted, and well-orchestrated. Organizations must do the same with their security postures.
Neil Proctor, vice president of Engineering R&D at Acronis SCS, joins host John Gilroy on this week's Federal Tech Talk to discuss how his company can help a federal agency accomplish the goal of resiliency.
In today's Federal Newscast, Congress is asking four agencies about SolarWinds-sustained damage and more.
House Appropriations Subcommittee on Homeland Security members questioned CISA leaders about plans to improve federal cybersecurity efforts.
In the wake of the SolarWinds breach, the Senate Intelligence Committee turned to industry for recommendations on how to ensure that kind of incident doesn’t happen again.
Anne Neuberger, the administration’s deputy national security advisor for cybersecurity and emerging technology, said in a White House press briefing that the breach compromised the networks of nine agencies and about 100 private-sector companies.
SolarWinds officials are trying to make their case to agencies that they are creating more rigor and security in their development and testing processes.
NIST will finalize new publication NISTIR 8276 that will include eight key principles for protecting IT supply chains and release the draft to update SP 800-161, which will includes specific steps for agencies.
Brian Varine, the associate director of Guidehouse Advanced Cyber Solutions, said the SolarWinds breach highlighted gaps in agency cyber environments both from an operational and a visibility perspective.
Federal agencies - and there are several of them at least - affected by the SolarWinds cybersecurity fiasco are under a new deadline.