article thumbnail

Using Automation to Meet CISA’s Vulnerability Management Directive

FedTech Magazine

Cyberattacks against government agencies have risen significantly since the introduction of the Cybersecurity and Infrastructure Security Agency’s Binding Operational Directive 22-01. Such attacks increased 95 percent in the second half of 2022 compared with the same time period in 2021, according to CloudSEK.

article thumbnail

Federal Cloud Transformation: Navigating Challenges With a Zero-Trust Approach

GovLoop

Digital transformation is a driving force for government agencies, with cloud technology playing a pivotal role. Recognizing its significance, the highest levels of government are actively embracing Zero Trust. However, the focus isn’t solely on adopting modern IT; it’s equally about safeguarding it.

Security 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Mapping the Cyber Threat Landscape

GovLoop

In the United States, the number of unfilled jobs stands at about 410,000, a 9% increase over 2021. As Fortune points out, these shortages are good news for cyber wages — and bad news for government agencies competing for talent. Another persistent problem: Agencies aren’t applying patches to known vulnerabilities.

2023 98
article thumbnail

Governments Find Strength in Numbers

GovLoop

CISA Coordinates a National Effort The federal government has collaborated with state governments on cybersecurity over the years. But the National Defense Authorization Act (NDAA) of 2021 institutionalized those efforts by creating a network of state coordinators under CISA’s purview.

article thumbnail

TechUK celebrates UK’s top 200 fastest-growing tech companies in public sector

Open Access Government - Technology News

As the UK’s leading technology trade association, techUK is pivotal in fostering innovation and collaboration across businesses, government agencies, and stakeholders. The foundation of the Tech200 awards lies in an analysis conducted by Tussell’s market intelligence platform.

article thumbnail

How to Secure Legacy Systems

GovLoop

But legacy hardware and software, which abound in government agencies, can create a barrier to implementing zero trust. The control plane is responsible for managing the configuration of the data plane proxies. Devices: Implementing compliance monitoring, access controls and asset management to all devices.

article thumbnail

Need to Improve CX? Low-code Automated Testing Can Help

GovLoop

Government agencies have a lot riding on improving their constituents’ customer experience (CX), and they understand the consequences. In fact, one in three respondents to a Salesforce survey said that trust affects their willingness to share personal information with government.