Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Federal agency technology and security professionals have increasing awareness of the dangers lurking in the components of the commercial software they buy and use. That, coupled with specific policy requirements in the administration’s Executive Order 14028, has made ensuring the safety of the software supply chain a top concern.
Read moreThe National Counterintelligence and Security Center (NCSC) leads counterintelligence for the national government. Among its myriad missions is securing the software supply chain. “My directorate is certainly concerned with the supply chain of all critical infrastructure, certainly the supply chain that the IC has to source from as well,” Jeanette McMillian, Assistant Director of NCSC’s Supply Chain and Cyber Directorate said on Federal Monthly Insights – Securing the Supply Chain.
In 2011, billionaire software developer and Netscape co-founder Marc Andreessen wrote a seminal article for the Wall Street Journal about “the software revolution.” He began the piece by proclaiming, “Software is eating the world.”
The Information Technology Industry Council (ITI) is a global advocate for technology, representing some of the world’s most-notable and innovative companies. ITI promotes public policies and industry standards that advance competition and innovation worldwide.
Twelve members of Congress shave been appointed to a new commission to lead the House’s exploration of AI’s transformational opportunities.
Navy Secretary Carlos del Toro unveils partnership involving the Office of Naval Research, Naval Postgraduate School, U.S Naval Academy and Naval War College.
CYBERCOM also has ‘enhanced budget control’ over cyber forces thanks to the fiscal 2024 appropriations bill, as officials craft plans for ‘CYBERCOM 2.0.’
The Technology Modernization Fund handed out more than $47 million to NASA and the Labor Department for cybersecurity and application modernization projects.
The Okta breach provides an opportunity for federal agencies to reassess and strengthen their cybersecurity posture.
A newly proposed rule by CISA, tasks those operating in critical infrastructure sectors to report cyber incidents within 72 hours.
Sen. Ron Wyden (D-Ore) cites a Cyber Safety Review Board report that blames Microsoft’s inadequate cybersecurity culture.
One federal office has turned to employee monitoring technology in recent years, and it’s led to a major rift between workers and management.