Remove federal-civilian
article thumbnail

IBM to acquire Octo to boost its US government business

CIO

Octo exclusively serves the US federal government, including its defense, health, and civilian agencies, boosting IBM’s ability to expand its presence in this highly lucrative segment.

article thumbnail

An open letter to tech workers about careers in public service

TechCrunch

I was able to support the drafting of Presidential Policy Directive-41 that outlines how the federal government organizes itself during a significant cyber incident. I was then able to take that understanding and build out a federated security program at a large tech company, where I helped lead Log4j shell response efforts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FedRAMP In Process Designation, A Milestone in Cybersecurity Commitment

Cloudera

It’s been said that the Federal Government is one of, if not the largest, producer of data in the United States, and this data is at the heart of mission delivery for agencies across the civilian to DoD spectrum. Learn more about how partnering with Cloudera can help you strengthen your federal agency’s hybrid data infrastructure.

article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

Check out CISA’s urgent call for federal agencies to protect themselves from Midnight Blizzard’s breach of Microsoft corporate emails. federal agencies and Microsoft. Cybersecurity and Infrastructure Security Agency (CISA) in its Emergency Directive 24-02 , sent to federal civilian agencies last week and made public this week.

article thumbnail

Enabling Secure Access for the Federal Government – Meeting Comply to Connect Mandates

Ivanti

Ivanti has been helping federal civilian, intelligence, and Department of Defense (DOD) agencies do exactly that – swiftly, seamlessly, and cost-effectively. Comply to connect (C2C) simplifies this by enforcing that patches and hardened configurations are applied to devices before they connect and updated continually.

article thumbnail

Three U.S. Policy Recommendations to Strengthen OT Cybersecurity

Tenable

Direct federal civilian agencies to inventory their OT assets. The BOD requirement will increase organizational visibility and allow federal agencies to make risk-informed decisions about how to prioritize their cybersecurity budgets to best protect the most crucial assets. Simply put, you can't protect what you can't see.

article thumbnail

Cybersecurity Snapshot: Want to Deploy AI Securely? New Industry Group Will Compile AI Safety Best Practices

Tenable

federal government agencies, any organization in the public and private sectors can access them. gov’t civilian agencies A new report found that AI use among U.S. civilian federal agencies is growing rapidly, but that they generally could do a better job of managing the technology’s risk. In a 103-page report , the U.S.

Groups 72