Tag Archives: information and communications technology

Cyberspace Solarium Commission Proposes Strategy to Create Trusted ICT Supply Chains

ICT supply chain

The Cyberspace Solarium Commission has released a white paper that presents a five-pillar strategy to establish trusted supply chains for critical information and communications technologies. The strategy calls for the U.S. to identify key technologies and equipment through public-private partnerships and government assessments; ensure minimum viable manufacturing capacity; protect supply chain from compromise through information sharing, product testing and better intelligence; stimulate a domestic market via targeted infrastructure investment; and ensure global competitiveness.

Read More »

Robert Kolasky: CISA to Incorporate CMMC Aspects Into Supply Chain Guidance

robert-kolasky-cisa-to-incorporate-cmmc-aspects-into-supply-chain-guidance

Robert “Bob” Kolasky, an official at the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, said a CISA task force will issue “supply chain essentials” guidance that integrates aspects of the Department of Defense’s Cybersecurity Maturity Model Certification program, Nextgov reported Thursday.

Read More »

NTT Group to Help Las Vegas & Nevada Gov’t Adopt Smart City Platform

TYSONS CORNER, VA, December 11, 2018 — NTT Group will work with the state of Nevada and city of Las Vegas in an effort to implement a distributed smart city platform built on the Cognitive Foundation architecture for information and communications technology management, ExecutiveBiz reported Monday. NTT Data and other affiliated …

Read More »

BAE Offers Online Tool to Assess Cyber Readiness of UK Businesses

TYSONS CORNER, VA, Oct. 5, 2016 — BAE Systems has released an online platform that works to evaluate the cybersecurity measures for information and communications technology systems at organizations, ExecutiveBiz reported Tuesday. The company said Sunday the tool provides 10 questions based on guidance from the U.K.’s national information security authority to assess the …

Read More »