Smarter Gov Tech, Stronger MerITocracy

The Cybersecurity and Infrastructure Security Agency (CISA) has released new actionable guidance that focuses on mitigating volumetric distributed denial-of-service (DDoS) attacks against government websites. […]

General Services Administration GSA

The General Services Administration’s (GSA) Federal Acquisition Service (FAS) will complete its much-anticipated reorganization by early in fiscal year 2024, which begins on Oct. 1, 2023, the agency announced last week. […]

As the deadline quickly approaches for the military services to submit their respective zero trust execution plans, one thing is clear: the services are aggressively pushing to reach their zero trust goals. However, cyber experts across the military services agree that they must remain smart as they make moves toward their zero trust goals. […]

quantum computing AI min

As quantum computing and related capabilities slowly but surely move closer to becoming practical realities, Federal government officials are confident that the U.S. will remain the global leader in quantum computing and quantum encryption. […]

AI

The head of the National Security Agency’s (NSA) data science and artificial intelligence (AI) efforts said that government agencies should consider how to apply AI to cybersecurity operations but warned that they also need to heavily focus on how adversaries will leverage the emerging tool against them. […]

Cyber workforce people

Federal agencies have increasingly adopted a human-centered approach to IT modernization to improve customer experience across the Federal government, and a key contributor to those efforts are the fruits of public-private partnerships. […]

NIH
capitol government shutdown government closed-min

Sen. Tim Kaine, D-Va., and Rep. Don Beyer, D-Va., introduced new legislation this week that aims to prevent government shutdowns and the burdens they cause for Federal employees, government contractors, and Americans who rely on government services. […]

Chris DeRusha, Federal CISO

While it’s clear that artificial intelligence (AI) technology is here to stay, a top Defense Department (DoD) tech official said this week that DoD must embrace the technology, but also proceed with caution. […]

Pentagon Military Defense DoD

The Pentagon submitted its proposed rule to implement the Cybersecurity Maturity Model Certification (CMMC) program to the White House for review in July and is now gearing up for the next phase of the rulemaking process: industry comments. […]

VA, Veterans Affairs
Verizon sign-min

The Justice Department (DoJ) said this week that Verizon Business Network Services agreed to pay a fine of $4.09 million to the government after failing to “completely satisfy certain cybersecurity controls in connection with an information technology service provided to federal agencies.” […]

Billington Cybersecurity Summit, DoD, Va, CompTia, ONCD panelists
NIST

The National Institute of Standards and Technology (NIST) released an initial public draft on Aug. 30 on the use of software supply chain security strategies within DevSecOps pipelines, and is seeking public comment on the draft through Oct. 13. […]

DoD Pentagon Military

Comply-to-Connect began in 2013 as the Department of Defense’s (DoD) program to help the service branches prevent unsecured devices from connecting to the DoD network. Long before that, in the mid-to-late 1990s, Michael Overstreet served as an Air Force information warfare officer working on cyber defense. Now, Overstreet is director of systems engineering at Cisco, and in this recent interview, he discusses how Comply-to-Connect has evolved – and how it today uses zero trust principles to protect access to the DoD network and data. […]

No Category Set!

In this episode of MeriTalking, MeriTalk’s Gail Emery sits down with Peter Romness, cybersecurity principal, CISO Advisors Office at Cisco, to explore how agencies need unifed cybersecurtity solutions, visibility across their enviornment, and comprehenseive threat intelligence capabilities to go toe-to-toe against bad actors – and earn the decision. […]

Top defense and intelligence officials shared this week the trends that worry them the most when it comes to the constantly evolving cyber threat landscape and what their top priorities are on the horizon given current world events and emerging cyber threat trends. […]

Pentagon Military Defense DoD

The Department of Defense’s (DoD) new initiative to create thousands of inexpensive autonomous systems will be a game-changer as the U.S. continues to combat China’s growing influence across the world and military mass, a top DoD official said today. […]

DoD Pentagon Military
Jen Easterly, CISA at Billington Cybersecurity Summit

As the Cybersecurity and Infrastructure Security Agency (CISA) finishes up the rulemaking process for the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA), CISA Director Jen Easterly said today that trusted partnerships are vital to sharing threat information in the meantime. […]

Republicans on the House Oversight and Accountability Committee are keeping up their pressure on the White House for data on Federal employees’ work from home habits, and on policy changes being pursued by the Biden administration that will return more Feds to their traditional office locations. […]

Gen. Paul Nakasone, Billington Cybersecurity Summit 2023

Categories