NIST
-
Cyber Leaders Warn Against Limitations of FedRAMP
Software supply chain risk management and continuous monitoring are key strategies for maintaining a strong cyber posture in the cloud.
7m read -
Security Strategies For Critical Infrastructure, Connected Devices
Federal cybersecurity leaders are seeking to protect critical assets through supply chain security and new standards.
7m read -
What is Zero Trust? Federal Agencies Embrace Cybersecurity Innovation
From buzzword to White House imperative, zero trust can be a confusing but necessary concept for security strategies.
7m read -
COVID-19 Has Reshaped Federal Health IT Security
Changes brought by COVID-19 have produced a corresponding shift in federal cybersecurity posture, particularly among agencies responsible for overseeing health care and medical IT systems.
7m read -
How the Pandemic Impacted Federal IT Modernization, Security Strategies
Bidenโs $1.9 trillion stimulus package includes $10 billion for IT modernization and cybersecurity needs at federal agencies.
7m read -
Customized Cloud Environments Require New Security Approaches
Sometimes making the most of the cloud means rethinking cloud security. Many federal agencies are still in the process of transitioning to the cloud, but as they customize their cloud environments to suit agency missions and priorities, they encounter new security challenges.
7m read -
Beating the Knowledge Gap in ICT Supply Chain Risk
One common refrain for securing information and communication technology (ICT) supply chains is to focus on acquisition and supplier visibility. According to top IT leaders at a FCW workshop this week, federal entities seeking to secure their ICT supply chains have a knowledge problem.
7m read -
NIST Recommends Zero Trust Approach to Cloud Security
The National Institute of Standards and Technology (NIST) recommends security and IT professionals deploy a zero trust strategy and continuous monitoring to optimize cloud security, according to a new report.
7m read -
Why Federal Agencies Turn to DevSecOps to Improve the ATO Process
Automating the authorization to operate (ATO) process could save federal agencies time and also enhance IT infrastructure security.
7m read -
Update: Cybersecurity Challenges, Solutions Grow with Telework Shifts
One month on, mobile device security and video-teleconferencing platforms enter the spotlight.
7m read -
The Cybersecurity Challenges in Government-Wide Move to Telework
Forward-thinking agencies face fewer vulnerabilities as attacks ramp up in intensity.
7m read -
NIST Releases Privacy Framework to Promote Innovation and Trust
The agency encourages organizations to engage with the framework and contribute to the standards' evolution.
7m read