Remove Data Remove Magazine Remove Risk Management
article thumbnail

Mobile Security – A Requirement for National Security (E166)

FedInsider

This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. We explore websites that are designed to fool the end users into believing they are on a secure platform.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement. Army War College.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Facing the Challenges Artificial Intelligence Poses

FedInsider

What agencies are looking for is help addressing their boots-on-the-ground challenges, such as the lack of specialized talent, where they should invest their limited R&D funds, meeting the lofty standards of the AI bill of rights – or even how their own data assets are gathered, organized, and used in AI applications.

article thumbnail

Emerging Technology Series: Cybersecurity

FedInsider

Articles and reviews written by him have appeared in numerous national publications including Chief Security Officer, Stars and Stripes, The Washington Post, NextGov Magazine, Newsweek, The Wall Street Journal, Washington Technology, Network World, The Sacramento Bee, The Boston Globe, Government Computer News, Up Front New Mexico and many others.

article thumbnail

Using the Tools at Hand to Get to Zero Trust

FedInsider

Additionally, Mark helps clients understand where to start with zero trust and how to utilize security program management and security risk management to ensure continued success in the implementation of Zero Trust concepts.

article thumbnail

From a recent practitioner: More of what’s ahead for federal acquisition in 2024

Federal News Network

Acquisition is the primary way where the government gets access to the products and services that it needs to deliver on the mission, and it’s data driven process. 100% of acquisition, the heart of the smart modern acquisition is data. And we’ve done significant work over the last few years to get our data position strong.

article thumbnail

Bringing Agility to the Modern Security Operations Center (E132)

FedInsider

Robert Roser Chief Information Security Officer Robert “Rob” Roser is a particle physicist and currently serves as Idaho National Laboratory’s (INL) Chief Information Security Officer as well as Director for Cybersecurity and Chief Data Officer. He joined INL four years go.