Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews on our daily show blogs.
DHS launches 3-tier cyber strategy
Monday - 3/28/2011, 7:01pm EDT
The idea is based on automation, interoperability and authentication. DHS hopes this 3-tier approach could make networks more secure.
Fierce Government IT reports DHS's new strategy draws heavily on an immune-system analogy saying cybersecurity should become a matter of "automated courses of action" in which devices sense malicious actors and enact defensive responses on their own.
The report also calls for the creation of a "Cyber Center for Disease Control and Prevention," The Cyber CDC would watch for threats and incidents, disseminate data, perform threat analysis, make recommendations and coordinate preventive actions.
This story is part of Federal News Radio's daily Cybersecurity Update brought to you by Tripwire. For more cybersecurity news, click here.