A new report from Valimail released today found that Federal contractors have deployed Domain-based Message Reporting, Authentication, & Conformance (DMARC), but aren’t enforcing it. DMARC is an email authentication, policy, and reporting protocol, designed to combat incoming phishing and spoofing email spam. […]

Survey results discussed during a June 14 Digital Government Institute webinar seem to bode well for end-user reception of deployment of Continuous Diagnostics and Mitigation (CDM) Phase 3 technology by the Department of Homeland Security, which is charged with improving the security of Federal civilian networks.






[…]

DHS Continuous Diagnostics and Mitigation (CDM) is pivotal to improving government cybersecurity. While it’s critical, it has a lot of moving parts–and that can make it difficult to follow. MeriTalk sat down with Kevin Cox to get a handle on the state of CDM, as well as an understanding of where the program goes from here. And, it’s quite a story–so I hope you’re sitting comfortably, feel free to grab a cup of coffee.






[…]

Kshemendra Paul, cloud action officer for the Department of Homeland Security’s (DHS) chief information officer, said Wednesday at MeriTalk’s 2018 Cloud Computing Brainstorm that while DHS has yet to establish the concrete business value of cloud migration, the financial benefits are just one piece of the puzzle in proving cloud’s worth to the agency.






[…]

The House Homeland Security Committee today approved H.R. 5733, the DHS [Department of Homeland Security] Industrial Control Systems Capabilities Enhancement Act of 2018, that would amend the Homeland Security Act of 2002 to give DHS’s National Cybersecurity and Communications Integration Center (NCCIC) the responsibility to maintain capabilities to identify threats to industrial control systems (ICS).






[…]

The digital transformation in government IT is driving modernization but also expanding the attack surface Federal agencies have to protect. The traditional perimeter no longer exists. Today, there is no “inside” or “outside” the network when it comes to detecting, defending, and deterring cyber attacks.






[…]

1 2 3 13