NIST Recommends Agencies Assume They Have Already Been Hacked

NIST Recommends Agencies Assume They Have Already Been Hacked
NIST Recommends Agencies Assume They Have Already Been Hacked

The Security Measures publication focuses on running software, while the Recommended Minimum Standards focuses on developing it.

Government’s ‘Critical Software’ Rules Could Drive Away Industry

Government’s ‘Critical Software’ Rules Could Drive Away Industry
Government’s ‘Critical Software’ Rules Could Drive Away Industry

“It’s quite possible that if [the government] doesn’t get this right, then none of those companies will want to do business with government,” defense acquisition expert Bill Greenwalt told Breaking Defense. “That’s extremely problematic.”

Automation, ID & Zero Trust: NIST Scientists Speak

Zero-trust security “is not one single product that one can purchase off the shelf,” a NIST scientist observes. But underlying zero trust’s many component parts are a few critical elements, including identity and automation.

presented by
Free RHEL Is Also RHEL

Free RHEL Is Also RHEL
Free RHEL Is Also RHEL

Red Hat Enterprise Linux simplifies development use cases by providing a consistent way to host applications along their life cycle. Explore how easily using RHEL in development translates to a predictable and repeatable security certification and accreditation environment with no surprises when moving to production.

‘Start Of A New Day’: DoD’s New Cybersecurity Regs Take Effect Today

‘Start Of A New Day’: DoD’s New Cybersecurity Regs Take Effect Today
‘Start Of A New Day’: DoD’s New Cybersecurity Regs Take Effect Today

Designed to help secure the supply chain, CMMC requires the defense industrial base to protect Controlled Unclassified Information.

presented by
An Imminent NIST Compliance Imperative for Defense Primes and Subcontractors

An Imminent NIST Compliance Imperative for Defense Primes and Subcontractors
An Imminent NIST Compliance Imperative for Defense Primes and Subcontractors

Five Crucial Details You Must Know.

NIST Recommends Tightened DoD Contractor Security

NIST Recommends Tightened DoD Contractor Security
NIST Recommends Tightened DoD Contractor Security

An interconnected ecosystem of primes, subs, suppliers, and partners mean one weak link can bring down the entire chain.

HAC Pumps Up NIST Research On Emerging Tech

HAC Pumps Up NIST Research On Emerging Tech
HAC Pumps Up NIST Research On Emerging Tech

House Appropriators add millions of dollars to the National Institute of Standards & Technology’s work on AI, cybersecurity, quantum computing, 3D printing, and 5G telecommunications.

Navy Issues New Cybersecurity Standards – With More To Come

Navy Issues New Cybersecurity Standards – With More To Come
Navy Issues New Cybersecurity Standards – With More To Come

The Navy has issued new cybersecurity standards that every unit, office, and contractor had better get to know. Governing everything from business systems to weapons systems to machinery controls, the standards will govern future information technology acquisitions and provide a benchmark for assessing where existing systems fall short. The Navy’s just getting started, too. Last…