Top Takeaways from the FY24 Federal Budget Request: Civilian Agency Edition
Recently, we covered the top highlights and technology pinpoints to hone in on for the DoD’s share of the FY24 federal budget request. We’ll take a look at the civilian side of things as well, spotlighting five agencies in particular that will likely have among the biggest IT projects and initiatives across the federal civilian landscape in the next fiscal year. Spoiler alert – there’s a lot of funding to go around.
The DoD’s FY24 Budget: Intel and Insights from the Latest Request
It’s March again, and that means the madness of the tournament, or rather the federal budget process, has begun. It’s the time of year when the federal government places its bets on priorities and initiatives that will require funding in the coming year(s). We’ll take a look at the Department of Defense’s (DoD’s) specific call-outs, what to watch for, and where you might place your own technologies across the complex landscape of agencies.
Readiness, R&D, and Dominance
The Navy’s Latest Cybersecurity Pursuits and How to Bring Your A-Game
The Department of Navy (DON) recently held its annual WEST Conference, this year with a strong emphasis on cybersecurity. The conference brought together key decision-makers from the Navy, Marine Corps, and Coast Guard, along with experts from various industries and government officials. The discussions were broad-ranging, covering topics related to naval warfare, technology, innovation, and cybersecurity.
DISA's Priorities for Fiscal Year 2023 and Strategies for Success
At a recent Armed Forces Communications & Electronics Association (AFCEA) DC luncheon, Defense Information Systems Agency (DISA) Director Lt. Gen. Robert J. Skinner highlighted three key priorities for the fiscal year 2023: posture, position and partnerships. These priorities reflect the agency's ongoing efforts to meet the changing threats of today and secure the future of its information systems.
Vulnerability in SLED: How the Threat Landscape is Changing to Target Education, Small Municipalities
- Read more about Vulnerability in SLED: How the Threat Landscape is Changing to Target Education, Small Municipalities
The Cybersecurity and Infrastructure Security Agency (CISA) has seen increased malicious activity with ransomware attacks against K 12 educational institutions. Malicious cyber actors target school computer systems, slowing access, and rendering the systems inaccessible to essential functions, including remote learning. In some instances, ransomware actors stole and threatened to leak confidential student data unless institutions paid a ransom.
Ransomware attacks on US government organizations cost $18.9bn in 2020.
The IC’s Push for Secret Transparency
The Department of Defense Intelligence Information System (DoDIIS) conference took place in San Antonio, Texas from December 12-15. Its annual gathering of industry and government personnel invites networking, exhibitors and speakers to take on the top IT challenges currently facing the Department of Defense (DOD). Principal Deputy Director of National Intelligence, Dr. Stacy Dixon, spoke to the audience at large regarding data, its challenges, and opportunities within the intelligence community (IC).
Summer’s Over, But the HEAT is On
TD Synnex Public Sector’s Chief Cybersecurity Technologist, Don Maclean sat down with Mark Guntrip, Senior Director of Security Strategy at Menlo Security, to discuss one of the latest emergent security threats.
A Two-Pronged Approach to Improving Government Case Management Work
Government organizations have a bad rap for being inefficient. But with outdated technology and limited spending, they aren’t exactly set up for success. And the expectations from stakeholders are high, with funding provided primarily by taxpayer dollars.
Why Government CIOs Need to Rethink Their Tech Procurement Strategy
As government agencies and organizations look to modernize their technology stacks to keep up with changes in the workforce, aging solutions, and closing contracts, they’ll all set out with a similar process: submit an RFP, review submissions, and choose a vendor. Seems simple enough.
But what government CIOs often don’t realize is that requiring proven, specific use cases may be limiting what their new (and likely expensive) technology investment can do for their organization. Here’s what I mean.
Be Ready for The Next Big Cybersecurity Threat
The rise in a remote workforce and use of cloud-enabled business applications equates to the browser essentially becoming our office, providing access to all necessary tools, data, and communications. Threat actors understand this paradigm shift and are now utilizing Highly Evasive Adaptive Threats (HEAT) to initiate ransomware, extortion ware, and other endpoint intrusions.
HEAT attacks are the next generation of cyber threats.