Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Although the exact definitions of zero trust may vary, for the 16th Air Force that means breaking traditional relationships.
Read moreThe federal government is getting closer to rolling out its Trusted Internet Connection 3.0 policy, and the Cybersecurity and Infrastructure Security Agency is laying the groundwork for agencies to begin using the program.
Chase Cunningham, Forrester Research vice president and principal analyst serving security and risk professionals, said he has seen nearly triple the attention paid to zero trust at agencies since this time last year.
NIST computer scientist Scott Rose said the publication is meant to help generate a “conceptual framework” for agencies and cybersecurity experts to apply zero trust principles within their enterprise.
The Cybersecurity and Infrastructure Security Agency is continuing its fast evolution as a standalone department.
Strengthening the current cybersecurity workforce with knowledgeable employees and implementing new cloud-based programs alongside legacy systems would significantly protect the U.S. public sector from looming threats.
AI can decode enormous amounts of financial data to discover the DNA of complex crime behaviors.
Jamie Holcombe, the chief information officer for USPTO, said a new contract award will help the agency move toward a Secure Access Service Edge (SASE) architecture.
Today, when system components are now IT components, the risk if greater but interconnectivity can also have preventative measures with cost benefits.
The Defense Department’s Defense Contract Management Agency is staffing up to prepare for assessments under the Cybersecurity Maturity Model Certification (CMMC) program in 2023 and beyond.
The House Select Committee on Modernization seeks ways to gain traction on pre-existing recommendations to make Congress more technologically savvy.
Ever since the Biden administration’s 2021 cybersecurity executive order, federal agencies have been on the clock to onboard zero trust architectures (ZTA) into their information technology