The General Dynamics Information Technology (GDIT) has announced the opening of the GDIT Emerge Innovation Center at its headquarters in Falls Church, Va., to better serve its government customers. […]

FITARA

Private-sector providers of IT and security technologies to the Federal government liked the general trend of improvement in agency grades on the 16th edition of the FITARA Scorecard that came out last week, but also are eager to see progress on scorecard grading categories that shine a brighter light on agency cybersecurity and cloud use. […]

AI

With few guiding lights available for government agencies to manage their artificial intelligence (AI) deployments, a new service just out from stackArmor is looking to fill that void in the same manner that the government’s FedRAMP (Federal Risk and Authorization Management Program) has been doing for years in certifying the security of cloud services used by Federal agencies. […]

AI

stackArmor, a provider of approval-to-operate (ATO) acceleration services for government organizations, today released its Approval To Operate (ATO) for AI accelerator. […]

AI

While the news bread is still not quite baked on this one, check us out next week for all the details on new research from MeriTalk and Pluralsight that shows what Federal government cybersecurity leaders need to succeed in the ever changing cyber landscape. […]

Lauren Knausenberger, Air Force CIO
AI

Amid rapid development of artificial intelligence (AI) and machine learning (ML) capabilities, a race against China to lead in AI, and increasing Federal funding, the question of whether AI will be widely adopted among Federal agencies has been resolved. […]

DoD Pentagon Military

Comply-to-Connect began in 2013 as the Department of Defense’s (DoD) program to help the service branches prevent unsecured devices from connecting to the DoD network. Long before that, in the mid-to-late 1990s, Michael Overstreet served as an Air Force information warfare officer working on cyber defense. Now, Overstreet is director of systems engineering at Cisco, and in this recent interview, he discusses how Comply-to-Connect has evolved – and how it today uses zero trust principles to protect access to the DoD network and data. […]

Accenture
Data

General Dynamics Information Technology (GDIT) announced Monday that it collaborated with the U.S. Army’s I Corps to successfully demonstrate the first-ever zero trust at the edge capability at Talisman Sabre 2023 military exercise in Australia. […]

messaging app, mobile phone
AI

MeriTalk recently sat down with Kathleen Featheringham, vice president of artificial intelligence and machine learning at Maximus, to discuss these issues and how Federal agencies can successfully move AI use cases from concept to design, pilot, and scalable enterprise deployment to achieve mission success in area ranging from citizen services to national security. […]

cybersecurity

In a new interview with MeriTalk, Brandon Iske, a principal solutions architect at identity platform provider Okta, and Bill Wells, a senior solutions architect at cloud provider Amazon Web Services (AWS), evaluate the successes and challenges that agencies are experiencing as they implement required identity protections and offer advice and best practices for agencies as they continue to plan and implement components of their zero trust architectures. […]

State Department
modernization
Cybersecurity

Officials from top private sector cybersecurity are looking ahead to key catalysts that will help advance the aims of the Biden administration’s National Cybersecurity Strategy implementation plan (NCSIP) released last week, including the promise of greater collaboration between the government and the private sector, and the degree to which Congress provides funding for government agencies to carry out the lengthy tasking list that the plan provides. […]

cyber workforce

MeriTalk recently sat down with Essye Miller, former DoD deputy chief information officer for cybersecurity, former acting defense chief information officer, and board member for Axonius Federal Systems, and Tom Kennedy, vice president, Axonius Federal Systems, to talk about what successful public-private partnerships look like, lessons learned from past partnership experiences, and how industry and government can come together effectively to work towards common goals that advance the nation’s cybersecurity. […]

Microsoft HQ
DHS

The White House released the 2023 National Cybersecurity Strategy almost 20 years to the month that the George W. Bush administration released its National Strategy to Secure Cyberspace in 2003. MeriTalk sat down with Simon Szykman, senior vice president for client growth at Maximus and a contributor to the 2003 strategy, to discuss the similarities and differences between the strategies and assess the work that still needs to be done to strengthen our nation’s cybersecurity. […]

DOD ICAM and IL5: Mission-Critical Cloud Security
Meritalking-Podcast-Censys-Podcast
DOD ICAM and IL5: Mission-Critical Cloud Security
Modernization Hits and Misses: Lessons from Decades of Digital Service Innovation
CISA

The Cybersecurity and Infrastructure Security Agency’s (CISA) binding operational directive (BOD) issued this week is a “step in the right direction,” according to industry leaders, who are eager to see its effectiveness in protecting network management interfaces from the public-facing internet. […]

Meritalking-Podcast-Censys-Podcast

In this MeriTalking podcast, MeriTalk’s Joe Franco is joined by Matt Lembright, director of Federal applications at Censys, which maintains a comprehensive internet map used for threat hunting. We’ll discuss the findings in Censys’s 2023 State of the Internet Report, the security vulnerabilities it uncovered, how Federal organizations can adapt – and how using data […]

MeriTalk recently sat down with Dale McCloskey, vice president, Federal sales, and Michael Loefflad, senior director, sales engineering, at cybersecurity company SentinelOne to discuss how agencies can overcome uncertainties about AI and ML and tap into the technologies to keep government secure at mission speed.   […]

Categories