Ideas

3 Essential Steps in Implementing a Comprehensive User Monitoring Program

Agencies must implement a comprehensive user monitoring program that effectively combines the human intelligence and artificial intelligence.

Ideas

The Federal Government is Using 20th-Century Responses to a 21st-Century Problem

Policymakers have been working on implementing continuous monitoring of its human assets with access to top secret information for several years, and the government should do the same for its digital assets.

Ideas

5 Steps to Protecting Federal Data Repositories in the Cloud

From ransomware to exfiltration, cybersecurity attacks are targeting sensitive government data. Here’s a reliable approach to protecting mission-critical information.

Ideas

It's Crunch Time for Homeland Security's Continuous Monitoring Program

To aggressively move forward and to defend critical infrastructure, we must first acknowledge the hurdles that stand before us. 

Cybersecurity

IG: CISA-Run Monitoring Program Has Not Improved DHS’ Cybersecurity Posture

The department’s inspector general also found vulnerabilities in the department’s technology due to poorly defined patch management roles and configuration settings.

Ideas

Addressing Insider Threats with Event Triggers 

An insider threat program that incorporates financial triggers can help identify at-risk individuals.

Ideas

A Test and Trace Strategy for Reconnecting to Government Networks

Agencies shifted to large-scale work from home operations but little thought has been given to how to secure these networks when workers return to the office. 

Cybersecurity

The Pentagon’s Cybersecurity Certification Plan Includes Continuously Monitoring Contractors  

A request for proposals outlines a portal where auditors would get automatic notifications if a company’s security score dips below a specified threshold.

Ideas

Keeping Up with Compliance in the Digital Age 

Late adopters to the Homeland Security Department’s Continuous Diagnostics and Mitigation program can still benefit.

Ideas

Can the Continuous Diagnostics and Mitigation Program Secure a Cloud Smart Government?

The good news is that CDM is proactively reaching out to leading cloud service providers for soltuions.

Ideas

The State of Continuous Diagnostics and Mitigation

Many agencies face the same challenges when trying to implement CDM capabilities.

Cybersecurity

Watchdog: OPM is At Risk of Not Being Able to Restore IT Systems Post-Disaster

The massive 2015 data breaches that exposed personal information of current and former federal employees are the subject of an ongoing lawsuit. 

Cybersecurity

DHS Cyber Monitoring Program Is Shedding Light on Agencies’ Shadow IT

Before using tools provided under the Continuous Diagnostics and Mitigation program, agencies only knew about four of every seven devices that connected to their networks, according to program manager Kevin Cox.

Cybersecurity

House Committee Advances Bill to Expand DHS Cyber Monitoring Program

As state and local governments face rising cyber threats, the legislation would give them free access to the tools provided under the Continuous Diagnostics and Mitigation program.

Cybersecurity

Lawmakers Want to Expand DHS' Cyber Monitoring Program to State and Local Governments

Under a forthcoming bill, lawmakers also aim to make it easier for agencies to put the data collected under the program to good use.

Ideas

Can New Technologies Restore a Robust Federal Cyber Perimeter?

Many agencies are deemphasizing traditional notions like perimeter security and concentrating more on the concept of resiliency, recovery and ways to mitigate the effects of a breach.

Cybersecurity

Agencies Are Leaving Sensitive Data Vulnerable to Hackers, Congress Says

Amid growing threats from China, Iran and Russia, most agencies are struggling to put in place even the most basic cybersecurity measures, according to congressional researchers.

Cybersecurity

NASA Official Credits DHS’ Cyber Tools with Transforming Its Cyber Stance

The space agency has a much better grip on its vast data since it has deployed Continuous Diagnostics and Mitigation tech.

Cybersecurity

Air Force’s New Fast-Track Process Can Grant Cybersecurity Authorizations In One Week

The process is a mix of quick but comprehensive testing up front followed by continuous monitoring through the life of the app.