Hello, Guest!

Category: Cybersecurity

PreVeil’s Sanjeev Verma on Protecting Controlled Unclassified Information for CMMC, DFARS ComplianceCybersecurity

PreVeil’s Sanjeev Verma on Protecting Controlled Unclassified Information for CMMC, DFARS Compliance

Sanjeev Verma, founder and chairman of PreVeil, said defense contractors seeking to protect sensitive controlled unclassified information while ensuring compliance
Keeper Security’s Mike Eppes on Meeting CMMC Requirements With Zero Trust-Based Password Management ToolsCybersecurity

Keeper Security’s Mike Eppes on Meeting CMMC Requirements With Zero Trust-Based Password Management Tools

Mike Eppes, director of public sector at Keeper Security, said password management is one of the areas the Cybersecurity Maturity
HP Federal’s Matt Barry on Significance of Endpoint Security by DesignCybersecurity

HP Federal’s Matt Barry on Significance of Endpoint Security by Design

Matt Barry, chief operating officer at HP Federal, noted that threat actors can use endpoints as vectors that could enable
Cyturus CEO Robert Hill on Need to Secure Every Supply Chain Link to Protect US Defense CapabilitiesCybersecurity

Cyturus CEO Robert Hill on Need to Secure Every Supply Chain Link to Protect US Defense Capabilities

Robert Hill, founder and CEO of Cyturus, highlighted the importance of complying with regulatory requirements like the Department of Defense’s
Cytellix’s Brian Berger on Transforming Cybersecurity Through Governance, Risk & Compliance Combined With MDRCybersecurity

Cytellix’s Brian Berger on Transforming Cybersecurity Through Governance, Risk & Compliance Combined With MDR

Brian Berger, president of Cytellix, said merging governance, risk and compliance with managed detection and response could enable organizations to
CISA Looking at Partnerships to Map the Future of US Cybersecurity EndeavorsCybersecurity

CISA Looking at Partnerships to Map the Future of US Cybersecurity Endeavors

The Cybersecurity and Infrastructure Security Agency made a key push for partnerships with the 2021 establishment of the Joint Cyber Defense Collaborative,
USACE Opens Sources Sought Phase for Cybersecurity Operations Site at Fort MeadeCybersecurity

USACE Opens Sources Sought Phase for Cybersecurity Operations Site at Fort Meade

The U.S. Army Corps of Engineers is soliciting letters of interest from companies that can build a cybersecurity operations facility
David McKeown: DOD Eyes Targeted Zero Trust by 2027Cybersecurity

David McKeown: DOD Eyes Targeted Zero Trust by 2027

David McKeown, deputy chief information officer for cybersecurity and senior information security officer at the Department of Defense, said DOD
How the DOD Is Transforming its Cloud Service Offerings Approval ProcessCloud

How the DOD Is Transforming its Cloud Service Offerings Approval Process

The Federal Risk Authorization Management Program evaluates the security of Cloud Service Offerings, or CSOs, prior to their deployment in
GovCon Expert Chuck Brooks on Protecting the Cyber Frontier of Space Systems—Part TwoCybersecurity

GovCon Expert Chuck Brooks on Protecting the Cyber Frontier of Space Systems—Part Two

By Chuck Brooks, President of Brooks Consulting International Read part one here Securing space systems is imperative. Satellite security must