The Cybersecurity and Infrastructure Security Agency says a long-term vision for zero-trust adoption across agencies is coming into focus.
The State Department makes a big policy change to passports. All federal fighters will likely make no less than $15 dollars an hour. And Guantanamo Bay is on the chopping block — again.
Ericom's Chase Cunningham joined host John Gilroy on this week's Federal Tech Talk to discuss the concept of zero trust.
By embracing a zero trust architecture, agencies can have full visibility and control over their resources, ensuring the devices connecting from various physical locations are safe.
Chris DeRusha, the federal chief information security officer, said the annual Federal Information Security Management Act (FISMA) report to Congress further highlights why the administration is focusing on some key areas to improve.
DoD wants to work toward creating a digital identity for all 8 million of its customers—servicemembers, their families, contractors and civilian employees.
It's been building for a while, the move to implement an architecture known as zero trust in agency information technology networks. Now the Biden administration has specifically called for it in a recent cybersecurity executive order.
In today's Federal Newscast, House and Senate lawmakers seek to overturn a ban on the Postal Service shipping alcohol to households.
President Joe Biden mandated dozens of new steps to address long-standing cybersecurity challenges in a new executive order signed Wednesday.
Agencies will continue to exist in a multi-cloud world for the foreseeable future.
Bill Moore, the CEO and founder of XONA, offers some tips for how agencies can better secure operational technology along with IT.
Bryan Rosensteel, a cybersecurity architect for the public sector at Cisco’s Duo Security, said if cybersecurity tools make technology difficult to use, employees will not use them.
As the global leader in mobile security, Zimperium protects thousands of enterprises and government agencies worldwide. It is no surprise that100 percent of our customers have detected mobile threats including compromised and jailbroken devices, mobile phishing campaigns, malicious/risky apps, and network attacks.
Although vulnerabilities stemming from both companies software were present on hundreds of DoD systems, officials say there's no evidence that cyber adversaries actually exploited them.
This discussion with Dave Zukowski, a principal technical consultant for public sector at Akamai, is part of Federal News Network’s DoD Cloud Exchange.