Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
In today's Federal Newscast, a new bill is introduced to set up a temporary federal commission to propose recommendations for eliminating certain agencies.
Essye Miller, the principal deputy chief information officer at DoD, is retiring from federal service on June 30 after more than 35 years in government.
As they transition, Federal agencies must continue to defend against threats on their existing infrastructure while extending that protection to the exploding number of remote endpoints connecting to their networks.
Guy Cavallo, the deputy CIO at SBA, said the work under the CDM and TIC programs over the last two years is opening the door to pilot zero trust concepts and move away from the “hub and spoke” model for its network.
This week on Federal Tech Talk, Stephen Kovac, vice president of Global Government and Compliance at Zscaler, joins host John Gilroy to discuss the pros and cons of secured remote access.
North Dakota reported smooth a telework transition, recommending compliance standardization and reliance on aggressive IAM protocols with MFA and zero trust perquisites.
With this ever burgeoning regulatory environment, achieving and maintaining cybersecurity compliance is a complex process.
The federal government is getting closer to rolling out its Trusted Internet Connection 3.0 policy, and the Cybersecurity and Infrastructure Security Agency is laying the groundwork for agencies to begin using the program.
NIST computer scientist Scott Rose said the publication is meant to help generate a “conceptual framework” for agencies and cybersecurity experts to apply zero trust principles within their enterprise.
AppGate Federal Group President Greg Touhill joined host John Gilroy on this week's Federal Tech Talk to discuss Zero Trust, cybersecurity and how to reduce the attack surface for federal information technology.
John Davis, the vice president of public sector for Palo Alto Networks, said those key concepts that will move agencies toward a zero trust approach include protecting from the inside out versus the outside in, which has been the case for much of the past three decades.
Neha Anand, group product manager at Okta, offers four predictions for technology trends in the government sector in the new year.
In this interview, Mat Newfield goes in depth in the zero trust idea and what cyber people need to do to achieve a zero trust state.
John DeSimone, the vice president for Cybersecurity and Special Missions at Raytheon, said agencies have to ask themselves, can their data—not just their systems—survive an attack?