Sponsored Resource

  • Defense
    shutterstock ID:  640599397 By kb-photodesign

    'Huawei ban' means contract modifications

    The General Services Administration is seeing high rates of acceptance of contract modifications from contractors to comply with acquisition rules in the 2019 defense bill. 09/11/2020

  • Cybersecurity
    global network (greenbutterfly/Shutterstock.com)

    Cyber, but in space

    A White House memo proposes that space-based technology must have cybersecurity built in at the design stage while also allowing flexibility for operators to adapt on the fly. 09/09/2020

  • Defense
    lock and keyhole

    CMMC reciprocity guidelines are still a work in progress

    The Defense Department is hoping to begin rolling its Cybersecurity Maturity Model Certification program later this year, but questions remain about how reciprocity with FedRAMP will be handled. 09/08/2020

  • Acquisition
    communications tower (noolwlee/Shutterstock.com)

    FCC estimates $1.8 billion to replace Huawei, ZTE telecom parts

    The agency also released a list of 51 firms that would qualify for reimbursement, spanning from smaller telecoms to large vendors like Verizon and CenturyLink. 09/04/2020

  • Defense
    protected laptop (La1n/Shutterstock.com)

    DISA to deliver web-browsing protection to 1.5M users

    The Defense Information Systems Agency is moving into production for its $199 million cloud-based internet security tool, aiming to migrate 1.5 million users in the first year. 09/04/2020

  • FCW Perspectives
    file sharing (cifotart/Shutterstock.com)

    The moving target of electronic records management

    Agencies are working steadily toward the requirements of M-19-21, but new collaboration technologies come with new challenges 09/04/2020

  • Defense

    National Guard plans all-virtual cyber exercise

    The National Guard is taking its annual Cyber Shield training exercise virtual due to COVID-19 with a spotlight on information operations. 09/03/2020

  • Biometrics
    facial recognition technology (Shutterstock.com)

    CBP isn't alerting air travelers to biometrics collection, watchdog says

    Customs and Border Protection's facial recognition program that collects photos of air travelers is hitting its performance targets according to a Government Accountability Office audit, but passengers aren't seeing privacy information and opt-out signage. 09/02/2020

  • Cybersecurity

    CISA, White House release vulnerability disclosure policies

    The Office of Management and Budget and the Cybersecurity and Infrastructure Security Agency have released a memorandum and Binding Operational Directive guiding federal agencies on how to set up their vulnerability research and disclosure programs. 09/02/2020

  • Cybersecurity
    code scan (Titima Ongkantong/Shutterstock.com)

    CISA bug bounty directive awaits White House blessing

    A draft policy from the Cybersecurity and Information Security Agency instructing agencies to create vulnerability disclosure programs to allow third-party bug hunters to flag security vulnerabilities in federal systems is all-but-completed, sources say. 09/01/2020

  • Comment
    mobile security (Production Perig/Shutterstock.com)

    Cybersecurity in the telework age

    Each mission environment has distinct needs and resources that don’t always fit into a “one-size-fits-all” solution. 08/28/2020

  • Election Security
    open source election technology

    Experts tout election security gains since 2016

    While threats to election infrastructure endure, experts are telling the public not to lose sight of the many security gains that have been put in place over the last four years. 08/28/2020

  • Cybersecurity
    open lock (ESB Professional/Shutterstock.com)

    NASA doesn't know what's on its network

    According to an oversight report, the space agency can't provide an accurate count of the number of contractor-owned devices connected to its networks. 08/27/2020

  • Acquisition
    BY By julia.m Royalty-free stock vector ID: 779956477

    The risks of supply chain threat sharing

    Some of the most valuable data around supply chain threats – identifying suspicious or untrustworthy actors -- can often be legally perilous to share. 08/27/2020

  • Cybersecurity
    threat hunting (alphaspirit/Shutterstock.com)

    Disinformation on the cheap

    Online influence operations are often easy and cheap to set up with open source tooling, according to new research from Cisco Talos. 08/26/2020

Stay Connected

Opinion that Matters

  • Comment
    BY By julia.m Royalty-free stock vector ID: 779956477

    What it takes to future-proof federal IT supply chains

    We have now advanced past that initial disruption brought about by the COVID-19 pandemic, and agencies and organizations should ask themselves: how can we make our supply chains better for the long term, and how do we continue to improve work-from-home security? 11/30/2020

  • Comment
    customer experience (garagestock/Shutterstock.com)

    Leveraging emerging technologies to transform the citizen experience

    To effectively deliver a 21st century experience, agencies must prioritize modernizing digital call centers with these emerging technologies. 11/02/2020

  • Comment
    Shutterstock image 1658927440 By Deliris masks in office coronavirus covid19

    A post-COVID IT roadmap

    It's time to start talking about the next steps we need to take to ensure that our IT infrastructure and tools can continue to support the remote workers, while providing state-of-the-art, timely customer service 10/25/2020