cybersecurity

While zero trust may be the latest buzzword in cybersecurity, the security principles behind a zero trust architecture aren’t new. Adoption across the Federal government has been slow as agencies deal with legacy systems, budget issues, competing priorities, and a shortage of security experts. […]

employee workforce federal worker-min
employee hired workforce worker-min
Cybersecurity cyber

A plethora of still-developing advanced technologies – plus new systemic approaches that recognize the growing dominance of cloud and managed services – will be key drivers of security improvements for Federal agencies several years from now as they continue to implement the Continuous Diagnostics and Mitigation (CDM) program. […]

A sampling of many of the most important private-sector players supplying technology and services through the Continuous Diagnostics and Mitigation (CDM) Program reveals optimism about the pace of Federal agency implementation of the program. […]

Since the Defense Information Systems Agency (DISA) began implementing its internal vulnerability management continuous monitoring security program – Assured Compliance Assessment Solution (ACAS) – officials who have worked closely with the solution have praised ACAS’s capabilities, from its continuous passive monitoring, to its dashboarding and prospects of scaling to the cloud. DISA first issued ACAS’s […]

cctv closed circuit surveillance camera video monitoring footage

Military cybersecurity officials said at MeriTalk’s Tenable GovEdge 2018 event on May 3 that they can focus more on taking the fight to adversaries if the private sector can continue to provide the military with strong network defense technologies. […]

A Federal CISO handbook is due out soon from the CISO Council, said Jeff Wagner, Acting Chief Information Security Officer at the Office of Personnel Management. The new guidance aims to cut down on technical language barriers and standardize compliance formatting across the Federal enterprise. […]

cybersecurity

Tenable announced that it recently discovered a critical remote code execution vulnerability in two Schneider Electric applications used in manufacturing, oil and gas, water, automation, and wind and solar power facilities. […]

Last month, the Department of Homeland Security issued a rare public alert about a large-scale Russian cyber campaign targeting U.S. infrastructure. The news raised serious concerns about vulnerabilities in the nation’s power grid and other critical infrastructure assets.   […]

Today, Suzette Kent will walk into the Eisenhower Executive Office Building to start her tenure as Federal CIO. After cleaning out a few cobwebs–the office has been empty for over a year–Kent will get started on advancing the Trump Administration’s IT modernization priorities. […]

After a spate of recent attacks, including the WannaCry and Dyn breaches, cybersecurity is a chief concern for companies and government agencies alike. Representatives from the private sector, Federal government, and Congress will convene at Tenable’s GovProtect event on June 21 to address cybersecurity issues. […]

Darron Makrokanis, vice president of Federal for Tenable Network Security, said the cybersecurity executive order’s time frames are a “bit aggressive,” but the emphasis on cybersecurity is a step in the right direction. Makrokanis will be speaking at Tenable’s GovProtect discussion on June 21. […]

Federal Joint Analysis Reports should include stronger language on indicators of compromise, according to Cris Thomas, a network security strategist at Tenable. DHS and the FBI released a JAR on Dec. 29 that discusses the tools Russian intelligence officers used to compromise the networks and infrastructure associated with the recent U.S. presidential election. […]

Tenable Network Security announced Oct. 13 it would support the National Institute of Standards and Technology’s Special Publication 800-171, a document enumerating guidelines to protect sensitive government information. […]

Categories