Understanding Barriers to Zero Trust

Two years following the "Cyber EO" naming zero trust as the security architecture of the future and after one year of implementing the Federal Zero Trust Strategy, federal agencies have made important progress predicting and identifying roadblocks. With the first major deadlines coming at the end of 2023, this year is critical for figuring out how to overcome identified barriers.

Resource Issues

A survey found that 35% of federal CIOs say they have "intermediate or advanced" zero trust capabilities in place, but there are concerns about having the right resources and funding to fully meet administration mandates. Nine in 10 respondents agreed a key step is having a zero trust assessment performed by an outside resource to identify gaps and key focus areas, but contracting and finding funding for this effort is difficult. With this assessment, existing resources can be assigned to the most critical and impactful areas, and the need for additional funding and resources can be prioritized. Funding specifically earmarked for zero trust will be in FY24 budgets. This funding is determined by aligning the work and tools needed across each capability area. Continue reading

Continuing Cloud Innovation

Use of Cloud Computing is now standard practice across federal, state, and local government agencies, but that does not mean the technology is growing stale. Organizations are finding new ways to use the flexibility of cloud computing to deliver on their missions.

Radio in the Clouds

The National Oceanic and Atmospheric Administration (NOAA) is examining options for a "transition from hardware-based ground radio processing to cloud-based software applications." In practice, this would mean digitizing NOAA radio frequencies using devices that are software-driven, rather than traditional hardware-based devices, to support the agency's satellite programs' need for telemetry processing--the reading and transmission of data from a remote source. Continue reading

Beyond Facial Recognition: Growing Applications of Biometrics in Government

Biometrics are more than facial recognition. Biometrics include all types of biological markers that can be used for identification. Fingerprints pre-date the use of facial recognition and today the practice continues to evolve to use other biological data for a wide variety of use cases.

Tapping into wearable data for first responder safety

The Department of Homeland Security recently funded several startups that have developed innovative monitoring technologies that can be used to protect the health, safety and mental well being of police officers, firefighters, and other emergency responders. These solutions include: Continue reading

FITARA Report Looks to Future Evolution

The 15th Federal Information Technology Acquisition Reform Act (FITARA) scorecard was issued in December 2022 to provide a look at how agencies are meeting modernization goals. Much like the 14th report, all measured agencies improved their scores or stayed the same indicating that changes are needed to ensure the report fully reflects today's modernization goals that have shifted from data center consolidation to cloud usage, and onward to Zero Trust cybersecurity strategies. The committee overseeing the scorecard, as well as industry groups, are looking at ways to better align modernization activities with the report.

FITARA 15 Findings

Currently, the seven active grading categories on the scorecard are: 1) progress in transitioning to EIS contracts; 2) CIO authority enhancements; 3) transparency and risk management; 4) portfolio review; 5) data center consolidation; 6) Modernizing Government Technology (MGT) Act; and 7) cybersecurity/FISMA. Continue reading

Defining the Value of Digital Assets

Digital assets are more than just bitcoin and they are having an incredible impact on how legitimate and illegitimate transactions are conducted. Breaking it down to a simple level there are three basic forms of digital assets:

  • Digital currency is the electronic form of traditional currency. It is what is stored in a digital wallet, transmitted electronically and then turned into actual cash when withdrawn from a bank or ATM.
  • Cryptocurrency is the encrypted form of digital currency that uses blockchain technology to move it around. Cryptocurrency does not require a financial institution to verify the transaction.
  • Non-fungible tokens (NFTs) are a one-of-a-kind digital asset that represents a real-world item such as photos, music, videos and trading cards.

Unfortunately, as with any new technology, bad actors are finding ways to exploit these assets while the rest of the world is still trying to fully understand them. Continue reading