Experts say the cybersecurity problem is too vast and complex to be solved by traditional approaches alone. Artificial intelligence (AI) can offer a lifeline to organizations overwhelmed by massive volumes of information technology (IT) and OT data as they try to stay ahead of the next big threat. MeriTalk recently sat down with two cybersecurity and AI experts at NVIDIA – Bartley Richardson, director of cybersecurity engineering, and David Reber, the company’s chief security officer, to discuss how AI can help solve the thorniest cybersecurity challenges.
The Department of the Air Force is focusing its modernization efforts on functional analysis, the agency’s chief information officer (CIO) said today, as a way to help accelerate legacy mission system migrations to the cloud.
This is the third in a three-part discussion about cyber asset inventories with Tom Kennedy, vice president of Axonius Federal Systems. Part one explored the role that cyber asset inventories play in establishing a zero trust approach to cybersecurity, and part two examined Federal government requirements for reliable asset inventories and their many benefits. Part three addresses the emerging need for cyber asset attack surface management and how agencies can best meet that need.
This is the second in a three-part discussion about cyber asset inventories with Tom Kennedy, vice president of Axonius Federal Systems. In the previous interview, Kennedy spoke to MeriTalk about the role that cyber asset inventories play in establishing a zero trust approach to cybersecurity. Part two examines Federal government requirements for reliable asset inventories and their many benefits.
As emerging technologies continue to evolve, industry and Federal government experts agree that their workforce must also be on the cutting edge to stay one step ahead of adversaries and help fill the cyber skills gap.
Digital twin capabilities have been growing at Federal agencies in recent years, deployed for everything from fighting wildfires to digitally designing aircraft for NASA. A 2021 survey found that 24 percent of Federal executives said their organization was experimenting with digital twin technology – which is made possible by the Internet of Things (IoT) – while 63 percent expected their organization’s investment in intelligent digital twins to increase over the next three years.
The United States and Finland tied for the top ranking on the Consumer Technology Association’s (CTA) International Innovation Scorecard released on Jan. 5 at the trade group’s CES 2023 technology conference in Las Vegas.
In recent years, the concept of an AI-empowered digital workforce has gained traction in the public and private sectors as employers seek ways to create efficiencies and alleviate the workload overload that many employees feel. The COVID-19 pandemic in particular has accelerated the trend.
Illumio, a provider of zero trust segmentation (ZTS) technologies, said today that its Illumio Government Cloud offering has received FedRAMP (Federal Risk and Authorization Management Program) In Process designation at a Moderate Impact Level, under the sponsorship of the Department of Health and Human Services (HHS) Office of Inspector General.
America is experiencing a technology revolution – one that is fueled by new funding, private and public sector partnerships, workforce needs, and global competition. And the issues and opportunities that come with emerging technologies are changing government IT and the Federal ecosystem as we know it.
Technology suppliers to the Federal government are telling MeriTalk that they expect to see Federal agencies place increasing emphasis on IT modernization efforts in 2023, along with continuing efforts to boost cybersecurity protections that modernized systems can help to achieve.
Cloud security provider Zscaler said this week that it has joined the Joint Cyber Defense Collaborative (JCDC), which was created last year by the Cybersecurity and Infrastructure Security Agency (CISA) to unify the efforts of cyber defenders from organizations around the world.
In keeping with tradition, the North American Aerospace Defense Command (NORAD) confirmed it has a special mission on Dec. 24: to track Santa’s Christmas journey, marking its 67th year of tracking Santa’s whereabouts as he and his reindeer travel around the world.
TikTok is one of the fastest-growing social media apps in the world, sucking users into its irresistible, infinitely looping feed of videos personally curated to their interests. However, Federal employees may now need to wait until they get home to watch the app’s latest dance craze or viral pasta recipe.
Private sector tech firms that help the Federal government improve tech and security capabilities are viewing last week’s FITARA Scorecard as a further call to action on the cybersecurity and IT modernization fronts.
As Federal agencies undergo IT modernization, they confront unique challenges, including the added complexity of multiple physical locations managing IT and cybersecurity functions in silos. New initiatives aim to develop enterprise cybersecurity models to increase safety, security, and effectiveness while reducing costs. MeriTalk recently sat down with Aruna Mathuranayagam, chief technology officer at Leidos, to discuss how agencies can approach IT modernization to achieve the speed, scale, and security they need.
Building on the May 2021 Cybersecurity executive order, Office of Management and Budget (OMB) memorandum M-22-09 sets out ambitious timelines for Federal agencies to improve cybersecurity. However, many agencies may be closer than they realize to the mandates laid out in M-22-09, particularly regarding multifactor authentication (MFA).
Following up on the May 2021 executive order (EO), which requires Federal agencies to adopt zero trust, the Office of Management and Budget (OMB) issued memorandum 22-09 (M-22-09) in January 2022. It sets forth a Federal zero trust architecture strategy, requiring agencies to meet specific cybersecurity objectives by the end of 2024. M-22-09 also provides specific direction for implementing identity-driven security measures such as multi-factor authentication (MFA) to prevent sophisticated online attacks.
To help fend off ever-increasing cyberattacks, Splunk is helping organizations to build a foundation of cyber resilience so they can have visibility into cyber threats, accelerate operations, and meet their mission.
“You can’t secure what you can’t see” is a common refrain in cybersecurity circles. It’s echoed in multiple Federal IT mandates, including the zero trust strategy and the event logging memo from the Office of Management and Budget. Gaining comprehensive visibility across agency networks, devices, applications, and identities is no mean feat in today’s diverse and ever-changing IT environments.
Federal and private sector experts will break down the future of data management at the Defense Department (DoD) as the Pentagon builds on its Joint All-Domain Command and Control (JADC2) strategy, during a Dec. 15 webinar from MeriTalk and Red Hat.
The private and public sectors are coming together to beat back bad actors, and that public-private partnership is something that cybersecurity experts on Dec. 8 said is “vital” to better protect data across the board.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) plans to host a new tech challenge next year that will test industry on its ability to deliver secure, accurate, and easy-to-use remote identity validation technologies.
The Defense Information Systems Agency (DISA) said today that it issued a Defense Department Provisional Authorization for “the Google Services cloud service offering for data categorized as Impact Level 5,” including national security systems.
What makes up the cutting edges of Federal government technology right now and taking shape for the years to come? We’re going to find out on December 8 as some of the very best next-tech explorers gather at MeriTalk’s “New & Next: The Government Tech Renaissance” in-person conference at Convene in Washington D.C.
As government agencies continue to ward off an increasing number of cyberattacks, they are working to identify gaps and develop strategies to bolster their cyber resilience and maintain mission focus. These attacks, ranging from phishing attacks to ransomware attacks, are only increasing in scope and complexity. While adversaries’ methods may vary, their goals of doing harm are the same.