Computers cloud connected-min

The Office of Management and Budget (OMB) has finalized its update to the Trusted Internet Connections (TIC) initiative in a memo released today. The final version of the policy opens the door for new approaches to network security, and retains most elements of the draft framework released in December 2018.






[…]

Cybersecurity cyber

Across multiple cybersecurity programs and efforts, the Federal government is prioritizing protection for its high value assets (HVAs), said speakers at ATARC’s Government Information Technology Executive Council (GITEC) conference on Monday, April 29.






[…]

Cybersecurity cyber

When the Trusted Internet Connections 3.0 (TIC 3.0) policy is finalized, Federal agencies can expect to quickly have four or five use cases that are approved by the Department of Homeland Security (DHS) due to initial pilots, said Michael Duffy, acting deputy director for DHS’ Federal Network Resilience Division, at Forcepoint’s Cybersecurity Leadership Forum on April 4.






[…]

Phone mobile security protection

With growing interest in cloud, mobility, and zero-trust technology, industry leaders in the identity credential access and management (ICAM) space are seeing a divergence between the existing policy of Common Access Card (CAC) and personal identity verification (PIV) cards, and new technology.






[…]

Cloud security provider Zscaler announced today that it received FedRAMP (Federal Risk and Authorization Management Program) authority to operate (ATO) at the Moderate Impact Level for its Zscaler Internet Access-Government (ZIA-Government) solution–nearly coincident with the Office of Management and Budget’s release of a draft update of its Trusted Internet Connections (TIC) policy late Friday.






[…]

The Office of Management and Budget (OMB) released a draft of its Trusted Internet Connections (TIC) policy late Friday, with the goals of removing barriers to cloud and modern technology adoption, ensuring that the TIC initiative remains agile, and streamlining and automating verification processes.






[…]

Categories