The Cybersecurity Infrastructure Security Agency’s Shields Up Program
In view of current events, the Cybersecurity Infrastructure Security Agency (CISA) has noted the increased likelihood of a cybersecurity breach. Their recommendations, listed below, speak mainly to the basics of cybersecurity: foundational practices and technology that protect every enterprise, in both the public and private sector. Below are the key elements (full details are here Shields Up | CISA):
Update from DoD Town Hall: Got CUI? Expect a Third-Party Assessment
In a Department of Defense (DoD) Town Hall held on February 10, led by David McKeown, DoD’s Senior Information Security Officer and Deputy CISO, we heard some news about CMMC. Defense contractors holding Controlled Unclassified Information (CUI) will need a third-party assessment to obtain certification.
State CIOs Top 2022 Priorities: How Can You Prepare for the Upcoming Budget Cycle?
On December 8, 2021, the National Association of State Chief Information Officers (NASCIO) released its 2022 annual top 10 priorities list identifying the most pressing technology and policy issues that state CIOs are prioritizing for the upcoming year.
Cybersecurity Funding Opportunities for State and Local Governments
Adhering closely to the U.S. federal government’s top legislative priorities for 2022, state chief information officers (CIO’s) have once again ranked cybersecurity as their top priority for 2022, following an already established decade-long trend in this direction.
Federal Eye on Customer Experience calls for IT Modernization
Recent signals by the U.S. federal government suggest that customer experience (CX), primarily citizen-facing services will receive attention and investment from funding sources like the Technology Modernization Fund (TMF). The initial $311 million awarded by the TMF primarily went to projects focused on cybersecurity in keeping with stated priorities and the prevalence of cybersecurity threats. From the beginning, however, TMF has emphasized CX projects that focus on how taxpayers engage with government services in secure digital environments.
What You Need to Know About the FY22 National Defense Authorization Act and Related IT Provisions
President Joe Biden signed the National Defense Authorization Act (NDAA) for fiscal year 2022 (FY22) into law on December 27, 2021. It authorizes $770 billion in defense spending which is a 5% increase over last year. This marks 61 consecutive years that a bill received bipartisan support from congress (a display of agreement that has become increasingly rare for DC politics).
3 Key Opportunity Areas in the Public Sector for Fiscal Year 2022
With another busy year behind us, it’s time to look ahead to fiscal year (FY) 2022. The official information technology (IT) budget request is $97B, a 4% increase over FY21, which would be a new record. Of course, those numbers undercount all the IT spending that goes unreported. Furthermore, remaining provisions in the American Rescue Plan, the Technology Modernization Fund and IT provisions in the Infrastructure Bill will represent additional pockets of opportunity worth billions for channel partners and technology vendors.
A Developer’s List of Key Container Security Risks
There are a variety of excellent reasons to use containers. They're more agile and consume fewer resources than virtual machines. They provide more flexibility and security than running applications directly on the OS. They are easy to orchestrate at massive scale using platforms like Kubernetes.
2021 Threat Hunting Report: OverWatch Once Again Leaves Adversaries With Nowhere to Hide
This time last year, the CrowdStrike Falcon OverWatch™ reported on mounting cyber threats facing organizations as they raced to adopt work-from-home practices and adapt to constraints imposed by the rapidly escalating COVID-19 crisis. Unfortunately, the 12 months that followed have offered little in the way of reprieve for defenders. The past year has been marked by some of the most significant and widespread cyberattacks the world has seen.
Apply Security Controls to Network Traffic Within the Perimeter With Zero Trust
Zero Trust is an approach to network security which assumes that just because something is on your network, doesn’t necessarily mean it is trustworthy. Zero Trust allows organizations to apply security controls to network traffic within the perimeter, not just at the edge.