Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Researchers at mobile security firm Lookout discovered a security flaw in Google Glass which allowed them to capture data without the user's knowledge, when the user merely took a photo that captured a malicious QR code. Lookout was able to force Google Glass to silently connect to a Wi-Fi access point, which let the researchers view all of the data flowing to and from the device. When combined with an Android 4.0.4 web vulnerability, the hack apparently gave researchers full control of the Glass headset.
DHS awards 17 vendors a spot on the continuous diagnostics and mitigation contract. Agencies can now access a common set of tools and services to improve how they monitor and secure their computer networks.
The FRTIB awarded Science Applications International Corporation (SAIC) a five-year, $224.5 million contract. SAIC beat out several competitors including incumbent Serco.
Building off a project to assess the nation's overall cyber capabilities, the Department of Homeland Security has begun drawing up plans for how it would respond in the event of a range of cyber emergencies affecting critical infrastructure.
A recent briefing between the House Veterans Affairs Committee, VA IT executives and DHS ended with the lead majority staff member walking out before the meeting ended. The rising tensions between the House Veterans Affairs committee's majority and VA come as a report surfaced showing veterans are at a higher risk of identity theft than the average citizen.
The council is restructuring to match the Obama administration's technology priorities for innovation, governance and cybersecurity. It will now operate with three main committees instead of five.
The departments of Commerce, Homeland Security and Treasury submitted suggestions to the White House on what incentives the government can offer to induce critical infrastructure providers to use the cybersecurity framework to improve their systems and networks. NIST is leading an effort to develop the framework with industry.
Two London men have each been sentenced to two months in jail following contempt of court convictions for misusing the Internet while serving on a jury. One of them posted a Facebook message while the other used Google to search for extra information about the victims of a fraud case and later shared the information with other jurors. A 2010 UK survey by the Guardian found that about 12 percent of jurors involved in high-profile cases had supplemented courtroom evidence with Web searches.
Both the White House and Congress have asserted that protecting the nation's resources from cyber-attacks is a top priority. Techworld is reporting enacting legislation designed to enhance security for critical infrastructure components such as water, power, telecom and transport facilities that is acceptable to both political parties has been a struggle. The problem political differences. But Cyber industry leaders have started to work on a voluntary standards and best practices platform to provide some level of security.
Howard Schmidt, the former cybersecurity coordinator for the Obama administration, joined In Depth with Francis Rose to discuss the growing market in zero-day detection
The FBI hopes a new portal, iGuardian, will enable the FBI to help companies protect themselves against malware by creating a repository of cybersecurity breaches.
A recent IG report said the State Department's Bureau of Information Resource Management's Office of Information Assurance lacks organization and lags in performance. The report made 32 recommendations for the office.
Brendan Goode, the director of network security deployment in the National Protection and Programs Directorate in DHS, said 15 out of the initial 23 agencies expected to implement Einstein 3 have signed memorandums of agreements with the department. E3A will use both unclassified and classified indicators to understand risks and vulnerabilities of federal networks.
Bruce McConnell announced today his intention to leave the Homeland Security Department in August after spending more than four years in an assortment of senior cybersecurity positions. He will be third senior ranking cyber official at DHS to leave since January.
Cyber-attacks on banks are growing more frequent. Wall Street has just conducted a cyber-defense exercise called "Quantum Dawn 2,". During the drill, bank employees were stationed at their normal offices, and were emailed throughout the day with bits of information that could indicate an encroaching hacker attack. They monitored a simulated stock exchange for irregular trading and were pressed to figure out what was going on and how to react while sharing information with regulators and each other.
Ever hear of the Multi-State Information Security and Analysis Center? It's a division of the Center for Internet Security. Their focus is cyber threat prevention, protection, response and recovery for state, local territory and tribal governments. Their objectives iclude providing two-way sharing of information and early warnings on cyber security threats, dissemination of information on cyber security incidents, to promote awareness and coordinate training.
Will exploit developers become potential targets of state-sponsored assassinations in the future -like the nuclear scientists in recent times? There's been some discussion in the "Tech" community regarding the legitimacy of using lethal force against civilian hackers. As a result some are wondering what the future might hold for exploit developers and other members of the cyber supply chain who are facilitating state-funded, offensive cyber operations.
We hear a lot about zero-day attacks and system vulnerabilities, but most hackers look for easier enterprises like the application used to access the Web. That's the one most online attackers will target. Why? Because most attackers and online exploit kit designers realize that the common browser is usually an endpoint's weakest link. Not only are enterprises generally slow to keep up with browser patching, they're downright sluggish at updating plug-ins and extensions.
While leaders at CMS said the hub connecting personal information stored in the health insurance marketplace to multiple agencies will be ready by the Oct. 1 deadline, legislators are concerned with how well CMS is securing individuals' personal information from cyber threats.
Dan Doney, the new chief innovation officer at the Defense Intelligence Agency, talks about the agency's plan to change the way it interacts with industry and brings innovation to government.