bnv.fnr.news/technology;cybersecurity=stories;tile=1;pos=top;sz=728x90,970x90;ord=
1:29 am, November 1, 2014

Cybersecurity News

Recommendations attempt to raise acquisition, cyber consciousness

GSA and DoD release six suggestions for how to better integrate cybersecurity in the acquisition progress. The recommendations are one of the deliverables under the cyber Executive Order President Obama signed last February. GSA will release a RFI in the coming weeks to let industry and others comment on how best to begin implementation.

Thursday - 01/30/2014, 04:20am EST
Listen

Agencies settling in on better privacy controls

More agencies are recognizing the growing importance of keeping data private after recent information leaks and cyber breaches. The Federal Trade Commission is among the agencies at the head of the pack and is relying on best practices.

Wednesday - 01/29/2014, 03:45am EST
Listen

House Veterans Committee adds latest VA cyber breach to ongoing investigations

Rep. Jeff Miller (R-Fla.) wants answers from the Veterans Affairs Department after its latest privacy and cyber breach of the data of more than 5,000 veterans through its eBenefits portal. VA says it has fixed the software defect and its Data Breach Core Team is investigating what happened.

Monday - 01/27/2014, 03:57am EST

12 ways to better merge cloud services with ongoing cyber initiatives

A new white paper from SafeGov recommended ways for agencies to move to an integrated cloud and cyber approach and away from one that is fragmented and ad hoc in many respects. Karen Evans, a co-author of the report and a former Office of Management and Budget administrator for e-government and IT, said agencies need a clearer picture of how this integration could happen.

Thursday - 01/23/2014, 04:09am EST
Listen

DISA's commercial cloud strategy remains a work in progress

The Defense Information Systems Agency says an eventual commercial cloud buy probably won't be bundled into a single contract vehicle, but in the meantime, DoD needs to work through challenges involving security, approval policy and network operations.

Wednesday - 01/22/2014, 04:30am EST
Listen

Evidence of system hacks varies

How can you tell if your system has been compromised? Internet security firm Mandiant says there are numerous signs. Included are evidence of unauthorized use of valid accounts, trace evidence & partial files, command and control activity, known and unknown malware, suspicious network traffic, valid programs used for other purposes and files that have obviously been accessed by attackers. IT managers are reminded that threats can slip in undetected and lay dormant for long periods of time before striking.

Tuesday - 01/21/2014, 10:26am EST

Online shopping rules evolve

How do you shop securely online. The Center for Internet Security says you should "know your online merchants. Limit online shopping to merchants you know and trust. Only go to sites by directly typing the URL in the address bar. If you are unsure about a merchant, check with the Better Business Bureau or the Federal Trade Commission to ensure its legitimacy. Confirm the online seller's contact information in case you have questions or problems. Use a credit card, not a debit card. Credit cards are protected by the Fair Credit Billing Act and may reduce your liability if your information is used improperly.

Tuesday - 01/21/2014, 10:25am EST

Online shopping risks grow

Devices such as smartphones and tablets are being used more and more often for online shopping and the Center for Internet Security is warning that means the volume of attacks against them will increase as well. The "center" says every time you download an app, you open yourself to potential vulnerabilities. Their advice is to research those apps you plan to download to verify their legitimacy. Update all apps when notified and disable Bluetooth and Near Field Communications when not in use to reduce the risk of your data, such as a credit card number, being intercepted by a nearby device.

Tuesday - 01/21/2014, 10:21am EST

Companies need to know when they are hacked

Recently several large U.S. companies were hacked online and like other victims of similar attacks, they were not aware until well after the attack happened. In some cases it was months. Online security firm Mandiant says, often attacks are blamed on malware, but they say 46% of compromised machines have no malware on them. Mandiant says hackers can navigate through conventional safeguards easily leaving little or no trace.

Tuesday - 01/21/2014, 10:20am EST

E-Gov Fund continues to stand alone, gets boost to $16M

Senate lawmakers won out over the debate about whether or not to merge the E-Government Fund with the Federal Citizen Services Fund. DHS also receives $166 million for cybersecurity programs in the fiscal 2014 spending bill.

Tuesday - 01/21/2014, 03:56am EST

DHS awards $60 million in cyber awards

GSA made the first set of awards under the continuous diagnostics and mitigation (CDM) contract.

Friday - 01/17/2014, 02:44pm EST

Health care website passed recent security test

Concerns about health care website security easing as recent testing successfully completed

Friday - 01/17/2014, 04:40am EST

Agencies get specific instructions to improve information sharing, safeguarding

The White House and the Information Sharing Environment released the Strategic Implementation Plan for the President's National Strategy for Information Sharing and Safeguarding. The plan details 16 initiatives that span federal, state, local and tribal governments as well as private sector and international partners.
January 16, 2014

Thursday - 01/16/2014, 02:07pm EST
Listen

All things federal IT

Federal News Radio Executive Editor Jason Miller joins host Mark Amtower to talk about a number of Federal IT issues.
January 13, 2014

Monday - 01/13/2014, 09:20pm EST
Listen

Cyber Silver Lining

With so much gloom and doom about Cyber vulnerabilities, the Rand Corporation has some good news. In his book Cyberdeterrence and Cyber war, Martin Libicki puts it into perspective --suggesting Cyberspace has its own laws; for instance, it is easy to hide identities and difficult to predict or even understand battle damage, and attacks deplete themselves quickly. But the overall message is… cyber war is nothing so much as the manipulation of ambiguity.

Monday - 01/13/2014, 04:44pm EST

Resolve to protect your computer

What's the best thing you can do for your computer? Make sure that it's secure. Kaspersky Lab says you should don't invite bugs and malware in by allowing your computer systems to become outdated. The security company urges you to install operating system and application updates as soon as they're available. It also suggests using your software's built-in systems, and don't ignore the prompts they give you to update your computer security.

Monday - 01/13/2014, 04:43pm EST

OMB revising data breach reporting requirements

The Government Accountability Office in a recent report found the requirement for agencies to report data breaches to the Homeland Security Department within one hour of discovering the incident is of little value.

Thursday - 01/09/2014, 11:06am EST

#SEA strikes again

The Syrian Electronic Army (SEA) said hacked into Skype's social media accounts last week. Now the Internet calling service confirms it had been hit with a "cyber-attack" but said no user information was compromised. SEA posted a tweet posted on Skype's official Twitter feed that read: "Don't use Microsoft emails (hotmail, outlook). They are monitoring your accounts and selling the data to the governments. More details soon. #SEA"

Monday - 01/06/2014, 08:54am EST

Mandiant Sold

Mandiant, the Virginia-based cyber-security firm than pinpointed a hacking unit in Shanghai that experts believe is part of the Chinese Army's cyber command has been sold. FireEye said that the purchase of privately held Mandiant would increase its ability to stop attacks in their early stages. The company valued the deal at nearly $1 billion.

Monday - 01/06/2014, 08:52am EST

Risk, cyber and physical security

On this week's Capital Impact show, Liberty Group Ventures President Kiersten Todt will discuss how corporations and the general public are handling the rollout of the cybersecurity framework.
January 2, 2014

Thursday - 01/02/2014, 07:52pm EST
Listen
  •  
  • 11
  •