Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
The Federal Energy Regulatory Commission said it needs authority to enforce cybersecurity standards. The agency also wants Congress to expand its jurisdiction over electric grid operators.
Senate Majority Leader Harry Reid is expected to bring a stalled cybersecurity bill up for a floor vote by the end of next week. Lawmakers are still haggling over the final details but the bill's sponsor, Sen. Joe Lieberman, believes he'll have enough votes to pass the revised bill that includes compromises lessening the impact for private industry.
Homeland Security officials are warning fans of the Olympic Games to be wary of online hackers, who take advantage of highly-publicized events and popular news stories to entice users to click on malicious links that download viruses or prompt for credit card information.
The Army has awarded a contract for cyber maneuvering technology so that network administrators can stay a few steps ahead of hackers.
New guidelines could help agencies adopting bring-your-own-device strategies manage the potential risks smartphones and tablets could pose.
W. Hord Tipton, executive director of The International Information Systems Security Certification Consortium (ISC)2, talks about his tenure as CIO of the Department of the Interior, and what you can do to protect data at your agency.
July 17, 2012
The FBI wants an automated testing system that can handle all Android applications. Researchers are trying to standardize a technique called fuzzing that forces outside data into the apps to find weaknesses.
The U.S. Cyber Challenge's annual cybersecurity camp program is now underway. It will run through July 20. Invited participants will go through four days of intensive training aimed at assessing and recruiting top cybersecurity talent.
Two lawmakers are angrily reacting to what they say is a lack of cooperation from a U.N. agency that may have sent computers and other technology to Iran and North Korea in possible violation of U.N. Security Council sanctions.
Homeland Security Secretary Janet Napolitano met with governors this weekend to highlight the role states can play in responding to cyber incidents. She spoke at the National Governors Association meeting in Williamsburg, Va.
Using a DARPA grant and its own money, the FBI has enlisted researchers at George Mason University to try out so-called fuzzing attacks.
The agency turns to teams of experts to review how departments are meeting the Trusted Internet Connections (TIC) initiative. DHS plans to expand the use of Blue Teams to the implementation of continuous monitoring and two-factor authentication under Homeland Security Presidential Directive-12.
Yahoo confirmed that a hacker group stole, then posted 450,000 unencrypted user-names and passwords from one of its services.
Thousands of people across the country have been conned into giving their Social Security numbers and other personal information online.
Sen. Richard Blumenthal (D-Conn.) said the United States is under cyber attack and that cybersecurity was a matter of national security.
The Air Force has awarded contracts to five companies to help it with a long-term cybersecurity project.
The Federal Network Security branch is performing Red and Blue teaming exercises to expose the soft spaces in agency networks and harden them. DHS has conducted five Red Teams and 28 Blue Team exercises in 2012. Federal CIOs and CISOs must request the Red Teams to analyze their networks. The agency receives a report on the biggest risks it faces.
Christopher Fountain, senior vice president of SecureInfo joins host John Gilroy to talk about IT security.
July 10, 2012
On Monday, the FBI turned off servers that had allowed thousands of computers infected with the DNSChanger virus to continue using the Internet.
If you're reading this online, you're fine. The day that was supposed to see thousands of people knocked off the Internet has arrived, but only a few people were affected.