IT workers workforce technology federal employees-min
AI
Robotic Process Automation
Jen Easterly

The director of the Cybersecurity and Infrastructure Security Agency (CISA) is calling out technology manufacturers for failing to create tech products that put the safety of customers first, and is calling for a new secure-by-design, secure-by-default cybersecurity model. […]

video conferencing

Because communications is often siloed from the rest of IT, many government agencies and Federal system integrators (FSIs) haven’t yet taken advantage of the range of services available from unified communications (UC) platforms beyond video conferencing. MeriTalk sat down with Meredith Krar, director of Federal systems integrators for Zoom, to discuss how UC capabilities can benefit agencies and FSIs and explore how FSIs can meet the requirements of the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) 2.0. […]

Connecting the Clouds: 2023 IaaS, PaaS, and SaaS Forecast
cybersecurity

With a mission of separating zero trust security fact from fiction, Zscaler’s Public Sector Summit on March 8 in Washington, D.C. is gearing up to showcase the latest intelligence from top-level government and industry cybersecurity leaders. The event will provide a unique opportunity for the public sector IT community to come together and share, learn, and collectively strengthen how the U.S. defends the mission of government against sophisticated and unrelenting threats. […]

Digital Transformation Summit 2023
cybersecurity

Every technological advance starts with an original idea, and in 2017 the co-founder of Axonius realized he had one. Dean Sysman, now the CEO at Axonius, knew that most of his fellow cybersecurity experts were focusing primarily on stopping cyber threats and finding the culprits. But what was even harder than pinpointing threats was getting a count of the assets that could be compromised. […]

cybersecurity

Experts say the cybersecurity problem is too vast and complex to be solved by traditional approaches alone. Artificial intelligence (AI) can offer a lifeline to organizations overwhelmed by massive volumes of information technology (IT) and OT data as they try to stay ahead of the next big threat. MeriTalk recently sat down with two cybersecurity and AI experts at NVIDIA – Bartley Richardson, director of cybersecurity engineering, and David Reber, the company’s chief security officer, to discuss how AI can help solve the thorniest cybersecurity challenges. […]

Lauren Knausenberger, Air Force CIO
cybersecurity

This is the third in a three-part discussion about cyber asset inventories with Tom Kennedy, vice president of Axonius Federal Systems. Part one explored the role that cyber asset inventories play in establishing a zero trust approach to cybersecurity, and part two examined Federal government requirements for reliable asset inventories and their many benefits. Part three addresses the emerging need for cyber asset attack surface management and how agencies can best meet that need. […]

Cyber

This is the second in a three-part discussion about cyber asset inventories with Tom Kennedy, vice president of Axonius Federal Systems. In the previous interview, Kennedy spoke to MeriTalk about the role that cyber asset inventories play in establishing a zero trust approach to cybersecurity. Part two examines Federal government requirements for reliable asset inventories and their many benefits. […]

supercomputer

General Dynamics Information Technology (GDIT) announced today that it received a $152 million supercomputing, cybersecurity, and software contract from the Alabama Supercomputer Authority (ASA) to support educational clients across the state. […]

Gaining an Edge With Digital Twins - One-on-One - Bill Corrigan

Digital twin capabilities have been growing at Federal agencies in recent years, deployed for everything from fighting wildfires to digitally designing aircraft for NASA. A 2021 survey found that 24 percent of Federal executives said their organization was experimenting with digital twin technology – which is made possible by the Internet of Things (IoT) – while 63 percent expected their organization’s investment in intelligent digital twins to increase over the next three years. […]

Cybersecurity

The United States and Finland tied for the top ranking on the Consumer Technology Association’s (CTA) International Innovation Scorecard released on Jan. 5 at the trade group’s CES 2023 technology conference in Las Vegas. […]

AWS, Teresa Carlson

Teresa Carlson, a former top executive at both Amazon and Microsoft, announced today that she is taking over as president and chief commercial officer at supply chain technology provider Flexport. […]

federal workers workforce IT workers employees millennial -min

In recent years, the concept of an AI-empowered digital workforce has gained traction in the public and private sectors as employers seek ways to create efficiencies and alleviate the workload overload that many employees feel. The COVID-19 pandemic in particular has accelerated the trend. […]

FedRAMP

Illumio, a provider of zero trust segmentation (ZTS) technologies, said today that its Illumio Government Cloud offering has received FedRAMP (Federal Risk and Authorization Management Program) In Process designation at a Moderate Impact Level, under the sponsorship of the Department of Health and Human Services (HHS) Office of Inspector General. […]

New & Next: Looking Beyond Boundaries

America is experiencing a technology revolution – one that is fueled by new funding, private and public sector partnerships, workforce needs, and global competition. And the issues and opportunities that come with emerging technologies are changing government IT and the Federal ecosystem as we know it. […]

IT

Technology suppliers to the Federal government are telling MeriTalk that they expect to see Federal agencies place increasing emphasis on IT modernization efforts in 2023, along with continuing efforts to boost cybersecurity protections that modernized systems can help to achieve. […]

CISA

Cloud security provider Zscaler said this week that it has joined the Joint Cyber Defense Collaborative (JCDC), which was created last year by the Cybersecurity and Infrastructure Security Agency (CISA) to unify the efforts of cyber defenders from organizations around the world. […]

Santa's Sleigh

In keeping with tradition, the North American Aerospace Defense Command (NORAD) confirmed it has a special mission on Dec. 24: to track Santa’s Christmas journey, marking its 67th year of tracking Santa’s whereabouts as he and his reindeer travel around the world. […]

TikTok

TikTok is one of the fastest-growing social media apps in the world, sucking users into its irresistible, infinitely looping feed of videos personally curated to their interests. However, Federal employees may now need to wait until they get home to watch the app’s latest dance craze or viral pasta recipe. […]

FITARA
IT

As Federal agencies undergo IT modernization, they confront unique challenges, including the added complexity of multiple physical locations managing IT and cybersecurity functions in silos. New initiatives aim to develop enterprise cybersecurity models to increase safety, security, and effectiveness while reducing costs. MeriTalk recently sat down with Aruna Mathuranayagam, chief technology officer at Leidos, to discuss how agencies can approach IT modernization to achieve the speed, scale, and security they need. […]

Building on the May 2021 Cybersecurity executive order, Office of Management and Budget (OMB) memorandum M-22-09 sets out ambitious timelines for Federal agencies to improve cybersecurity. However, many agencies may be closer than they realize to the mandates laid out in M-22-09, particularly regarding multifactor authentication (MFA). […]

Following up on the May 2021 executive order (EO), which requires Federal agencies to adopt zero trust, the Office of Management and Budget (OMB) issued memorandum 22-09 (M-22-09) in January 2022. It sets forth a Federal zero trust architecture strategy, requiring agencies to meet specific cybersecurity objectives by the end of 2024. M-22-09 also provides specific direction for implementing identity-driven security measures such as multi-factor authentication (MFA) to prevent sophisticated online attacks. […]

Cybersecurity

To help fend off ever-increasing cyberattacks, Splunk is helping organizations to build a foundation of cyber resilience so they can have visibility into cyber threats, accelerate operations, and meet their mission. […]

1 4 5 6 7 8 10

Categories