Government

The SecurityInfoWatch.com Government category is a collection of news, analysis, and other information relevant to security professionals who work in or provide services to the Government market. It covers issues pertaining to security management as well as security technology deployments by government (federal, state and local) agencies and facilities.
How to Build Government Cyber Resilience Against Zero-Day Vulnerabilities
Jan. 15, 2025
Two technologies can help predict and detect the attack methods adversaries might use and for government user intelligence.
TSA intercepts 6,678 firearms at airport security checkpoints in 2024
Jan. 15, 2025
This total is a minor decrease from the 6,737 firearms stopped in 2023.
Credit: Douglas Rissing
The Pentagon is expected to release a new assessment to evaluate and approve zero trust standards in early 2025.
Jan. 10, 2025
Bridging strategy and culture in the Pentagon aims to advance Zero Trust to secure data and support mission success by 2027.
Idemia Awarded Blanket Purchase Agreement For Next Gen Identity Proofing For Login
IDEMIA is one of 8 technology providers selected by GSA to accelerate the deployment of next-generation identity proofing technologies.
Info-Tech Research Group releases Whole-of-Government Governance Framework
Jan. 9, 2025
The resource provides actionable strategies to establish clear accountabilities, foster interdepartmental collaboration, and build a governance model that supports responsible...
U.S. Navy chooses Trellix to protect Navy Enterprise Grid from stealth cyber threats
Dec. 9, 2024
This announcement comes on the heels of Trellix's Impact Level 5 (IL5) High Provisional Authorization (PA) from the DoD for its Endpoint Detection and Response (EDR).
SIA opens call for speakers for 2025 GovSummit conference
Session proposals for GovSummit 2025 must be submitted by Friday, January 31.
Booz Allen and Palantir partner to advance and accelerate U.S. national defense
Dec. 6, 2024
The partnership has additional potential for co-creation, IP development, and teaming across a variety of critical missions.
Trend Micro announces FedRAMP authorization for Vision One for Government
Dec. 5, 2024
The new FedRAMP Authorization will bring Trend's advanced endpoint security and artificial intelligence capabilities to government customers.
ARES Security Corporation establishes Defense Advisory Board
Dec. 3, 2024
This board will play a vital role in shaping the strategic trajectory of ARES Security's solutions, strategic partnerships, and international relations.
Iveda applauds the Department of Homeland Security’s new AI guidelines
Nov. 27, 2024
Iveda reaffirms its commitment to ethical AI deployment under DHS SAFETY Act DT&E designation.
A September 2024 photo shows a powerful crane on the Intel Ohio One construction site in Licking County, Ohio. Students at nearby Johnstown Monroe Intermediate School named the powerful crane 'Ms. Armstrong,” paying homage to Ohio’s history in innovation, aviation and space. Standing more than twice as tall as the Statue of Liberty, the crane can lift 5.5 million pounds.
Nov. 27, 2024
The CHIPS Act award will directly support Intel’s investments at sites where the company develops and produces many of the world’s most advanced chips and semiconductor packaging...
DHS unveils new framework for the safe and secure deployment of AI in critical infrastructure
Nov. 22, 2024
Public sector entities, including federal, state, local, tribal, and territorial governments, are essential to the responsible adoption of AI in critical infrastructure.
Credit: Matic Grmek
Ransomware-as-a-service — known as RaaS — operators such as LockBit rely on networks of other malicious hackers known as affiliates to carry out attacks. RaaS operators provide the malware and infrastructure to affiliates, and the two sides share the ransom paid.
Nov. 20, 2024
Vulnerability-related threat intelligence can help organizations understand which software flaws threat actors are interested in exploiting.
docusign1
Nov. 19, 2024
The sophistication of these attacks, combined with their focus on state-level interactions, makes them particularly dangerous.