Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The pivotal role of cloud observability is now at the forefront, serving as the key to unlocking the full potential of the zero trust extended framework.
Transitional periods — even those spurred by a desire for greater cybersecurity — tend to increase insider risk.
CENTCOM is paving its own data narrative with a new strategy while moving closer to Combined Joint All-Domain Command and Control.
The Cybersecurity and Infrastructure Security Agency is introducing a new strategic approach for 2024 called the Federal Enterprise Operations Cyber Alignment Plan.
The way you start to build a zero trust architecture is to work with the three horizontal pillars to define and restrict the protected surfaces around the data. If you can break into my IT architecture but cannot get to the data, I win; I’m not happy, but I still won. The answer is to reduce the protected surface for the data. Smaller is easier to manage and protect.
DoD officials plan to have a call with the industry soon to clarify the latest FedRAMP equivalency memo.
HHS is moving toward a zero trust architecture, collecting information on where it may be vulnerable and refining its approach.
DIA is doing proactive inspections to make sure agencies are following cyber standards for securing the top-secret JWICS network.
DoD’s new guidance clarifies what FedRAMP equivalency means and requires cloud service providers handling controlled unclassified information to get a letter of attestation from a third-party organization that says they meet the FedRAMP Moderate baseline standards without plans of action and milestones.
Zero trust takes a multi-disciplinary team, full visibility into your network data, and a dash of artificial intelligence.
Zero trust architectures must cover both users and applications, and extend from the core network to the edge, all while giving all users an equal experience.
The Army is in the midst of collapsing all of its networks, aiming to achieve a "unified network" within the next three years.
While the buzzword of 2024 may be artificial intelligence, or some derivative like generative AI or large language models, the biggest challenge and focus for federal IT community will continue to be the people.
The Energy Department created standard training courses to ensure employees have a baseline understanding of zero trust requirements, while the CFBP is focused on software development, including open source software.