Policy
US-EU Alignment on Tech Policy Shaky in Face of Russian Aggression
The conflict in Ukraine is reinforcing an industry-friendly argument for how the government should regulate cybersecurity.
Cybersecurity
Zero Trust Could Become an 'Incomplete Experiment' Without Permanent Office, Advisors Warn
The government’s efforts to improve U.S. cybersecurity threaten to peter out if not firmed up.
Cybersecurity
NIST Refreshing Voluntary Cybersecurity Framework Amid Push for Mandates
The agency is soliciting comments to update a core document that lets entities pick and choose which technical standards they want to apply to their systems based on their own risk assessment.
Cybersecurity
Air Force Eyes Space-Centered Cyber Training
A new request for information is set to inform future budget and program decisions.
Emerging Tech
Quantum Tech Still Too Young to Warrant Export Controls, Defense Advisers Warn
A report commissioned by the Pentagon helps provide insight into how various federal agencies fit into big-picture policy considerations on the emerging national security issue.
Emerging Tech
Nuclear Regulators Want Machines to Monitor Cyberattacks on Power Plants
This isn’t the NRC’s first ask about machine learning and artificial intelligence.
Cybersecurity
F-35 program seeks cyber reinforcements
To improve the joint strike fighters' defenses against cyber attacks, the program office responsible for it wants an open system design solution.
Ideas
What It Will Take for NIST, CISA and OMB to Align on Zero Trust
Establishing a successful zero-trust architecture without implementing integrity monitoring is not possible.
Ideas
Building the Cybersecurity Workforce America Needs
No effort is more important in cybersecurity than creating a highly skilled workforce to protect both public and private systems.
Cybersecurity
Supply Chain Security Training and FISMA Overhaul Bills Clear House Committee
The committee chair highlighted a need for incident reporting and other requirements for federal contractors.
Cybersecurity
The U.S. is Working to Improve Ukraine’s Cyber Defenses in the Face of Russian Threat
The prospect of a cyberattack amid heightened regional tensions creates a stark contrast against delicate diplomatic efforts the U.S. is pursuing to thwart ransomware criminals officials say are operating out of Russia.
Cybersecurity
Audit: Labor Department Information Security Program ‘Not Effective’
Auditors made 18 recommendations to remediate some of the agency’s longstanding issues.
Cybersecurity
Security Specialists: Microsoft’s Discounted Logging Offering Warrants Scrutiny
The log management tool Microsoft is marketing as a way for agencies to fulfill administration requirements for network visibility could contribute to a risky ‘monoculture,’ according to cybersecurity professionals.
Emerging Tech
Extended Reality Sees Potential, Challenges Across Multiple Industries
A new GAO report itemizes how extended reality technologies can be used, and what other emerging tech needs to be bolstered to support its implementation.
Cybersecurity
EPA Leading White House Effort to Secure the Water Sector Against Cyberattacks
This is the third in a series of 100-day sprints to shore up industrial control systems used in critical infrastructure.
Cybersecurity
NIST Releases Final Cybersecurity Assessment Guidance
The document extensively reviews best practices in security assessments for organizations.
Cybersecurity
CISA Releases Finalized IPv6 Guidance for Agencies
The network guidance document is years in the making.
Cybersecurity
New CMMC Training to Align with Certification Changes
Look for trainers working on the Cybersecurity Maturity Model Certification program to realign their efforts to support recent changes to the certification process in 2022.
Cybersecurity
Feds Step Up Cybersecurity Support for State Governments
Forty-two advisers have been appointed or are in the process, with eight states still needing federal-level coordinators.
Ideas
The Top Challenges to Zero Trust Adoption Facing Government Agencies
Officials must overcome legacy tech and dated requirements.
Almost There!
Help us tailor content specifically for you: