Agencies must implement a comprehensive user monitoring program that effectively combines the human intelligence and artificial intelligence. Earlier this year, the Government Accountability Office revealed that...
Policymakers have been working on implementing continuous monitoring of its human assets with access to top secret information for several years, and the government should do...
From ransomware to exfiltration, cybersecurity attacks are targeting sensitive government data. Here’s a reliable approach to protecting mission-critical information. Federal government organizations are storing, accessing and...
To aggressively move forward and to defend critical infrastructure, we must first acknowledge the hurdles that stand before us. By the end of fiscal 2021, it...
The department’s inspector general also found vulnerabilities in the department’s technology due to poorly defined patch management roles and configuration settings. The Continuous Diagnostics and Mitigation...
Program managers said the summer will bring data quality checks. By this time next year, officials at the Cybersecurity and Infrastructure Security Agency plan to offer...
Recent Comments