NASA is looking to consolidate contracts across three different cloud service providers into a single agency-wide contract vehicle to meet the agency’s growing need for cloud services provided by small business resellers.
The U.S. National Science Foundation (NSF) and five other Federal government agencies have announcedcreation of a prototype version of an integrated data and knowledge infrastructure program that they say will form the basis of a far-reaching “open knowledge network.”
Some government officials are looking at college athletes as a new prospective pool of candidates to serve as future leaders and employees within the intelligence community (IC), according to one official.
Rep. Eric Swalwell, D-Calif., is planning to introduce legislation to clarify the role of the Cybersecurity and Infrastructure Security Agency’s (CISA) Joint Cyber Defense Collaborative (JCDC) program and criteria for membership in the group.
The Department of Homeland Security (DHS) has launched a new website aimed at simplifying access to grants and other resources to deter domestic terrorism acts.
The Cybersecurity and Infrastructure Security Agency (CISA) on March 21 released stakeholder-driven updates to the Cybersecurity Performance Goals (CPGs) for critical infrastructure entities and businesses that the agency issued last year.
Good communication plays an outsized role in how highly federated government agencies – those with numerous component parts – will be able to implement different approaches to zero trust security rather than pursue one-size-fits-all policies, Federal government officials said today at ATARC’s Zero Trust Summit event in Washington.
As the NSA is gearing up to hire about 3,000 new employees some of the officials in the agency warned that there will be volume and skills challenges ahead of this endeavor.
The U.S. Customs and Border Protection (CBP) has awarded Accenture Federal Services an IT infrastructure operations and modernization contract totaling $380 million.
While the widespread advent of quantum computing – and the concerns that it poses especially to current day cryptography and the cybersecurity technologies that rely upon it – may still be years away, a top Federal cybersecurity expert is mapping out three steps that organizations should be taking now to prepare.