Microsoft shows off government cloud services with JEDI due date imminent

Just a day after Google decided to drop out of the Pentagon’s massive $10 billion, 10-year JEDI cloud contract bidding, Microsoft announced increased support services for government clients. In a long blog post, the company laid out its government focused cloud services. While today’s announcement is not directly related to JEDI per se, the timing […] Continue reading Microsoft shows off government cloud services with JEDI due date imminent

Government’s supply chain risk is drawing more attention than ever, Capitol Hill aides say

Supply chain risk is one of the main things keeping cybersecurity-focused government officials and partners up at night, speakers said at a conference Wednesday in Washington, D.C. The possibility of vulnerabilities being introduced into government networks through a piece of foreign-made hardware or software has spooked agencies into thinking more about how to work with vendors, congressional staffers and government security contractors said at the KNOW Identity Conference. The federal government has cracked down lately on what it sees as risks from foreign technology companies such as Kaspersky, Huawei and ZTE. The potential problems go much deeper than that, the speakers said. Vulnerabilities deep in a service’s supply chain can be difficult for either the government or the vendor to detect and can be exploited by hackers. Simply trusting vendors to do the work isn’t enough, said Nick Leiserson, legislative director for Rep. Jim Langevin, D-R.I., said. “The idea that we’re just […]

The post Government’s supply chain risk is drawing more attention than ever, Capitol Hill aides say appeared first on Cyberscoop.

Continue reading Government’s supply chain risk is drawing more attention than ever, Capitol Hill aides say

Google Cloud gains federal certification, adds a suite of new security features

Google Cloud, the fastest growing cloud business in an booming industry, announced a long list of new security features on Wednesday including denial-of-service protection, data transparency and a “Cloud Security Command Center” designed to give customers visibility into where sensitive data is located, firewall rules and resource deployment. The command center is only in alpha right now, but it’s designed expressly to let teams know which data is open to the internet, which personally identifiable information and even which are vulnerable to cross-site scripting (XSS) vulnerabilities. “Administrators can identify threats like botnets, cryptocurrency mining, and suspicious network traffic with built-in anomaly detection developed by the Google Security team, as well as integrate insights from vendors such as Cloudflare, CrowdStrike, RedLock, Palo Alto Networks, and Qualys to help detect DDoS attacks, compromised endpoints, compliance policy violations, network intrusions, and instance vulnerabilities and threats,” Google announced in a Wednesday blog post. “With ongoing security analytics […]

The post Google Cloud gains federal certification, adds a suite of new security features appeared first on Cyberscoop.

Continue reading Google Cloud gains federal certification, adds a suite of new security features

Tech Brief: Leveraging your network to fortify cybersecurity

Enterprise CIOs and CISOs face a constant barrage of challenges, often leaving them little choice but to rely on best-of-breed products to shore up their organization’s cybersecurity posture. In today’s fast-changing threat landscape, however, that can be a dangerous gamble. Whether you’re trying to modernize your IT, lower your operating costs or improve cybersecurity, how you build your network is often the determining factor in whether you succeed or fail. A new CyberScoop Tech Brief, sponsored by Cisco, explores how taking advantage of modern, sensor-aware servers, switches, routers and security devices not only enables a holistic cybersecurity strategy, but also lowers operating costs and improves performance. Realizing the potential modernization and cybersecurity improvements promised by the passage of the Modernizing Government Technology (MGT) Act calls for agencies and commercial enterprises alike to recognize that the key place to start is with the network. Strategically enabling the security features of existing […]

The post Tech Brief: Leveraging your network to fortify cybersecurity appeared first on Cyberscoop.

Continue reading Tech Brief: Leveraging your network to fortify cybersecurity

As .gov turns to cloud, agency heads deliberate cyber-defense strategies

Agencies across the U.S. government are increasingly looking to migrate their data into the cloud to cut costs, but doing so has also introduced new cybersecurity challenges, federal executives said Wednesday during Verizon’s Government of the Future conference produced by FedScoop. Each government agency is defined by a very specific mission set, explained Census Bureau […]

The post As .gov turns to cloud, agency heads deliberate cyber-defense strategies appeared first on Cyberscoop.

Continue reading As .gov turns to cloud, agency heads deliberate cyber-defense strategies