Ideas
3 Essential Steps in Implementing a Comprehensive User Monitoring Program
Agencies must implement a comprehensive user monitoring program that effectively combines the human intelligence and artificial intelligence.
Ideas
The Federal Government is Using 20th-Century Responses to a 21st-Century Problem
Policymakers have been working on implementing continuous monitoring of its human assets with access to top secret information for several years, and the government should do the same for its digital assets.
Ideas
5 Steps to Protecting Federal Data Repositories in the Cloud
From ransomware to exfiltration, cybersecurity attacks are targeting sensitive government data. Here’s a reliable approach to protecting mission-critical information.
Ideas
It's Crunch Time for Homeland Security's Continuous Monitoring Program
To aggressively move forward and to defend critical infrastructure, we must first acknowledge the hurdles that stand before us.
Cybersecurity
IG: CISA-Run Monitoring Program Has Not Improved DHS’ Cybersecurity Posture
The department’s inspector general also found vulnerabilities in the department’s technology due to poorly defined patch management roles and configuration settings.
Cybersecurity
What to Expect from CISA’s Continuous Diagnostics and Mitigation Efforts in 2021
Program managers said the summer will bring data quality checks.
Ideas
Addressing Insider Threats with Event Triggers
An insider threat program that incorporates financial triggers can help identify at-risk individuals.
Ideas
A Test and Trace Strategy for Reconnecting to Government Networks
Agencies shifted to large-scale work from home operations but little thought has been given to how to secure these networks when workers return to the office.
Cybersecurity
The Pentagon’s Cybersecurity Certification Plan Includes Continuously Monitoring Contractors
A request for proposals outlines a portal where auditors would get automatic notifications if a company’s security score dips below a specified threshold.
Ideas
Keeping Up with Compliance in the Digital Age
Late adopters to the Homeland Security Department’s Continuous Diagnostics and Mitigation program can still benefit.
Ideas
Can the Continuous Diagnostics and Mitigation Program Secure a Cloud Smart Government?
The good news is that CDM is proactively reaching out to leading cloud service providers for soltuions.
Ideas
The State of Continuous Diagnostics and Mitigation
Many agencies face the same challenges when trying to implement CDM capabilities.
Cybersecurity
Watchdog: OPM is At Risk of Not Being Able to Restore IT Systems Post-Disaster
The massive 2015 data breaches that exposed personal information of current and former federal employees are the subject of an ongoing lawsuit.
Cybersecurity
DHS Cyber Monitoring Program Is Shedding Light on Agencies’ Shadow IT
Before using tools provided under the Continuous Diagnostics and Mitigation program, agencies only knew about four of every seven devices that connected to their networks, according to program manager Kevin Cox.
Cybersecurity
House Committee Advances Bill to Expand DHS Cyber Monitoring Program
As state and local governments face rising cyber threats, the legislation would give them free access to the tools provided under the Continuous Diagnostics and Mitigation program.
Cybersecurity
Lawmakers Want to Expand DHS' Cyber Monitoring Program to State and Local Governments
Under a forthcoming bill, lawmakers also aim to make it easier for agencies to put the data collected under the program to good use.
Ideas
Can New Technologies Restore a Robust Federal Cyber Perimeter?
Many agencies are deemphasizing traditional notions like perimeter security and concentrating more on the concept of resiliency, recovery and ways to mitigate the effects of a breach.
Cybersecurity
Agencies Are Leaving Sensitive Data Vulnerable to Hackers, Congress Says
Amid growing threats from China, Iran and Russia, most agencies are struggling to put in place even the most basic cybersecurity measures, according to congressional researchers.
Cybersecurity
NASA Official Credits DHS’ Cyber Tools with Transforming Its Cyber Stance
The space agency has a much better grip on its vast data since it has deployed Continuous Diagnostics and Mitigation tech.
Cybersecurity
Air Force’s New Fast-Track Process Can Grant Cybersecurity Authorizations In One Week
The process is a mix of quick but comprehensive testing up front followed by continuous monitoring through the life of the app.
Almost There!
Help us tailor content specifically for you: