ATARC Zero Trust Lab sees ‘enormous’ participation as agencies shop for tools

A small group of vendors will be invited back to demonstrate how they are beginning to integrate multiple tools.

cyber news

Booz Allen wins first prototype contract for DISA’s zero trust program

by • 17 hours ago

The federal contractor has six months to carry out the work.

CDM increasing visibility into agencies post-Cyber Executive Order

by • 5 days ago

Acting Program Manager Richard Grabowski tells FedScoop about changes to CISA's Continuous Diagnostics and Mitigation Program made since the cybersecurity executive order last May.

New CMMC-AB board chair Jeff Dalton wants to make CMMC ‘boring again’

by • 5 days ago

Jeff Dalton, the new chair of the CMMC-AB's board, says it's time for the board to "professionalize."

Dunkin: DOE’s cybersecurity posture ‘stronger’ than D grade reflects

by • 6 days ago

The CIO responded to criticism her department's priorities aren't in order and leave it vulnerable to attack.

FITARA 14.0 scorecard will feature a revised methodology

by • 6 days ago

Recent executive orders on cybersecurity and customer experience give the opportunity to revamp the scorecard.

Setting a new standard of security to meet modern threats

by • 7 days ago

Cisco’s Marc Moffett discusses a new benchmark for assessing security and trust

Biden signs memorandum to improve cybersecurity across DOD, intelligence community

by • 7 days ago

The memo specifies how the president's prior cybersecurity executive order applies to national security systems.

Federal agencies struggled to share information in SolarWinds aftermath, GAO finds

by • 2 weeks ago

Classified information created challenges, the GAO says, because agencies classify certain kinds of information differently.

Log4J flaw causing Army to take second look at open source software

by • 2 weeks ago

Army CIO Raj Iyer says the department is putting "extra effort" into cybersecurity following discovery of the vulnerability last year.

Isolate and stop cyber-risks by controlling privileged access

by • 2 weeks ago

A new report shows how managing privileged access allows organizations to run business operations, applications and critical infrastructure efficiently without sacrificing security.

TwitterFacebookLinkedInRedditGmail