IT
CISA

On December 13, 2020, the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive that called for agencies to disconnect or turn off any SolarWinds Orion products by noon the following day, due to an exploit of Orion network monitoring software that posed a “grave risk” to agencies, critical infrastructure providers, and other private-sector organizations. […]

The Department of Defense (DoD) recently called cATO the “gold standard” in cybersecurity. However, the current process for obtaining authorization to operate (ATO) is “point in time,” costly, and time consuming. Based on these issues, an alternative, continuous authority to operate (cATO), is gaining momentum. […]

High-performance sensor architectures are allowing for faster data processing as more data continues to become available and requires processing for analysis and artificial intelligence applications, officials from NVIDIA and Lockheed Martin said on March 24 at the NVIDIA GTC Conference. […]

As intense wildfires have become a more serious issue in the last few years worldwide – causing billions of dollars in damage in the western U.S. alone – firefighting teams need a better solution to mitigate and better understand the cause of the spreading conflagrations. […]

Rep. Zoe Lofgren, D-Calif., today called the Online Privacy Act of 2021 that she introduced in the House last year along with Rep. Anna Eshoo, D-Calif., a “good solid piece of legislation” that would regulate the collection, use, and retention of consumers’ online data, but also forecast that the bill has a “long ways to go” in the legislative process before it becomes law. […]

AI

Splunk’s cybersecurity and Security Orchestration, Automation, and Response (SOAR) suite can be combined with NVIDIA Morpheus running on Hewlett Packard Enterprise’s (HPE) Edgeline GPU-accelerated converged edge platform to provide AI-enabled real-time monitoring and remediation of an edge network, all while saving analysts and data scientists time. […]

As use of artificial intelligence (AI) increases across the public and private sector, companies like Lockheed Martin are using AI advancements to further missions and to even collaborate with NVIDIA to address wildfires. […]

Federal agencies are emerging from a tough season of security vulnerabilities – SolarWinds and Log4j among them – knowing that bad actors are changing their game plans. At the same time, agencies are improving their cyber playbooks with zero trust guidance from the White House, the Office of Management and Budget (OMB), the Cybersecurity and Infrastructure Security Agency (CISA), and others. […]

AI

As the Department of the Air Force deploys AI to maintain a competitive advantage and equip warfighters with the most effective tools to do their job, CIO Lauren Knausenberger said her agency is taking a “human-in-the-loop” approach to maintain strong ethical guidelines. […]

We sat down in recent days with Amy Gilliland, who has run General Dynamics Information Technology as president for going on five years, to talk mostly about how the company is helping Federal agencies cybersecurity and zero trust policy mandates, but in the course of a wide-ranging conversation came away with a whole lot more. […]

Happy Employee

In the summer of 2021, President Biden released the Executive Order (EO) on Diversity, Equity, Inclusion, and Accessibility in the Federal Workforce, and to meet the requirements outlined in the EO Federal agencies have strived to incorporate practices that build up diversity and inclusion in their respective workforce, agency leaders said during the ServiceNow Federal Forum 2022 on Mar.10.                                                  […]

ServiceNow Federal Forum

You can’t get much further afield than the International Space Station, where Red Hat helped to build systems that process data science locally rather than sending it back to Earth. This capability will become more important, notes John Dvorak, Red Hat’s chief architect for North American public sector, in a MeriTV interview. […]

Endpoint devices, or personal laptops, government-issued devices, tablets, mobile phones, etc. used outside of the network perimeter are key factors in a successful telework model. Keeping those devices secure from any location at any time is at the top of all IT team priorities. But are the security tools in place strong enough to combat bad actors, could Federal IT teams have too many endpoint security tools in their toolkit, and what is often overlooked on the journey to better endpoint security? […]

supply chain

President Biden was set to meet with administration officials and industry partners today to announce new investments in the domestic production of critical minerals and materials, which are crucial to many modern technologies. […]

In January 2022, government and industry technology leaders discussed edge computing challenges and opportunities. This article highlights progress and what is needed from government and industry as more and more data is collected and analyzed at the network’s edge. […]

ServiceNow Federal Forum

On average, it takes 287 days to identify and contain a data breach, according to IBM Security’s 2021 Cost of a Data Breach report. The longer the delay in identifying a breach, the costlier it is. When a breach takes more than 200 days to identify and contain, it cost organizations an average of $4.87 million in 2021, while breaches that took less than 200 days cost an average of $3.61 million, IBM found. […]

Recent waves of cybercrime underscore the importance of increased government visibility before, during, and after a cybersecurity incident. As adversaries continue to target government networks and other infrastructure, efficient event logging is crucial in identifying, investigating, and preventing attacks. President Biden’s May 2021 executive order on cybersecurity set new requirements for event logging, and Office of Management and Budget memorandum M-21-31 in August 2021 provided guidance for agencies on how to meet those requirements. […]

Cybersecurity

Organizations and agencies across industries and government have been rocked in recent years as cyberattacks are getting more sophisticated, costly, and disruptive. With the Federal government in the crosshairs of bad actors trying to steal sensitive data – or worse – President Biden has made cybersecurity a critical focus of his administration. His Executive Order on Improving the Nation’s Cybersecurity (EO 14028) gives Federal technology teams clear directives designed to quickly secure Federal networks. One of those directives instructs agencies to adopt a zero trust architecture. […]

Mask

Against the backdrop of a significant rise in cyberattacks against the Federal government and private sector organizations, President Biden has made cybersecurity a critical focus of his administration. His Executive Order on Improving the Nation’s Cybersecurity (EO 14028) gives technology teams marching orders with aggressive deadlines for securing Federal networks, systems, and endpoints. […]

space

The U.S. Space Force, the smallest and newest military branch, is looking to industry to serve as a leader in a number of innovative technology areas and to successfully collaborate with the service branch, according to Lisa Costa, Space Force’s chief technology and innovation officer. […]

AI

While the Federal government has been busy pouring billions of dollars into artificial intelligence (AI) technology development, it’s time to take stock of those efforts and start exploring the critical questions of what that work means for Federal agencies, employees, and citizens. […]

1 8 9 10

Categories