Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Adobe Systems Inc. says that the scope of a cyber-security breach disclosed nearly a month ago was much worse than initially reported. They now say attackers obtained data on more than 38 million customer accounts. The software maker also said that hackers had stolen part of the source code to Photoshop editing software that is widely used by professional photographers.
Singapore's government is on heightened alert for cyber-attacks after threats from claiming to be from international hacking collective Anonymous defaced several web sites in the city-state and threatened further action. "Government agencies have been on heightened vigilance and have enhanced the security of their IT systems in response to the declared threats against the government's ICT infrastructure," the Infocommunications Development Authority of Singapore (IDA) said in a statement.
The Homeland Security Department plans to send the final draft version of the National Infrastructure Protection Plan to President Barack Obama this week. Some industry experts say DHS failed to incorporate much of what was discussed at 30 meetings.
Obama claims 'full responsibility' for health care website fixes as security concerns surface
Army Research Lab is partnering with universities and scientists to explore the psychology behind cybersecurity.
In a message to senior executives, Secretary Eric Shinseki said that Stephen Warren now will hold the title of executive in charge, Office of Information and Technology and chief information officer. The title change comes as the House Veterans Affairs Committee is turning up on the heat once again on the agency's ability to secure its systems and protect data.
With the partial government shutdown behind them, members of Congress are working on several bills that impact the federal workforce, including a resolution that supports ending the federal pay freeze and a bill that tackles the claims backlog at Veterans Affairs.
Israel's military chief Lt. Gen. Benny Gantz says computer sabotage is a major concern and he warned a sophisticated cyber-attack could one day bring the nation to a standstill. In fact, a month before his address, a major artery in Israel's national road network in the northern city of Haifa was shut down because of a cyber-attack by a Trojan horse. Key operations were knocked out of commission for two days causing hundreds of thousands of dollars in damage.
A British man has been arrested in England and charged by the United States and Britain with infiltrating U.S. government computer systems, including those run by the military, to steal confidential data and disrupt operations, the Associated Press reports. U.S. prosecutors said the alleged hacker, Lauri Love, infiltrated thousands of computer systems including those of the Pentagon's Missile Defense Agency, the U.S. Army Corps of Engineers, the U.S. space agency NASA and the U.S. Environmental Protection Agency.
The Army still doesn't know whether its new and growing force of soldiers dedicated to cyber missions is large enough for the task. But it's certain it doesn't have the legal authorities it needs to attract and retain the talent it wants.
Earl Crane, senior principal at Promontory Financial Group, was Francis Rose's guest in studio for Industry Chatter.
As business practices, information technology and cybersecurity threats become more industry-agnostic, competition across and between industries for cybersecurity professionals will remain fierce, says Earl Crane, former member of the White House National Security Staff. Though professionals will be in short supply for years to come, increased mobility among industries and government will bring a leveling of common cybersecurity skills across the profession.
Command Sgt. Maj. Rodney Harris, the senior enlisted advisor at Army Cyber Command, said the Army is doing a good job at finding the right soldiers with the necessary skill sets to become cyber warriors.
NIST issues the industry-developed final draft approach to help critical infrastructure providers secure their computer systems. The agency is accepting comments over the next couple of months and will issue a version 1.0 of the framework in February. Industry offered mixed reactions to the framework. Some said it's too broad while others said it provides a set of agreed upon basic cyber protections.
Jason Healey, the director of the Cyber Statecraft Initiative for the Atlantic Council, endorsed an approach that would turn how government and the private sector work together to battle cyber threats on its head.
Russian authorities have arrested a man believed to be responsible for distributing a notorious software kit known as "Blackhole" that is widely used by cyber criminals to infect PCs, according to a person familiar with the situation. A former Russian police detective in contact with Russia's federal government told Reuters that the suspect, who is known in hacking circles as "Paunch," had been arrested.
The U.S. National Security Agency swept up 70.3 million French telephone records in a 30-day period, according to a newspaper report Monday that offered new details of the massive scope of a surveillance operation that has angered some of the country's closest allies. The French government summoned the U.S. ambassador for an explanation on Monday and renewed demands for talks on protection of personal data, as well as pledges that the surveillance would cease.
Inside the Reporter's Notebook: Acquisition, IT trends; Is cybersecurity awareness month still necessary?
News and buzz in the acquisition and IT communities that you may have missed this week.
Federal employees are eligible for a free one-day training session in early November on implementing continuous monitoring. The goal is to help agencies make good use of the continuous diagnostics and monitoring contract DHS awarded in August.
Eugene Spafford, a professor of computer science at Purdue University, and the executive director of the Center for Education and Research in Information Assurance and Security (CERIAS), a campus-wide institute for cybersecurity, said feds need to be held responsible for cyber problems and that would help improve the overall security state of the government.
October 17, 2013