Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
In a report from the Heritage Foundation, analyst Paul Rosenzweig said the bill still is intrusive, provides little liability protection for private owners and the proposed incentives would make the standards mandatory, not voluntary as lawmakers have claimed.
The European Union said it wants to hear from businesses, governments and citizens about their experiences on the Net.
Lt. Gen. Michael Flynn, who worked with elite special operations forces in Iraq and Afghanistan, is taking over Tuesday from Lt. Gen. Ronald L. Burgess Jr. as the senior military intelligence adviser to the secretary of defense and chairman of the Joint Chiefs of Staff.
Rob Strayer of the Bipartisan Policy Center's Homeland Security Project says the revised cybersecurity bill introduced in the Senate last week makes it voluntary for companies to comply with cybsecurity performance standards.
Rob Strayer of the Bipartisan Policy Center discusses the compromise cybersecurity bill. Daniel Schuman talks about the Congressional Research Service. Dick Gregg fills us in on the Treasury's annual fiscal report.
Piecemeal attempts to modernize an aging electric power grid have left it vulnerable to cyber attacks. Security has been an afterthought, according to a new report released by McAfee, a security technology company.
Victims need to speak up and report cyber attacks. That's the message from the Bipartisan Policy Center and top security officials, who say only a fraction of attacks are reported each year.
The revised Cybersecurity Act of 2012 removes DHS from having sole oversight authority of critical infrastructure and shares the responsibility across an interagency council. The bill also would make the implementation of cyber standards by critical infrastructure operators voluntary. The legislation encourages an incentive-based program.
The "Mahdi" virus records keystrokes, audio and screenshots from infected computers. The researchers believe the virus may have originated in Iran because the virus communicates with a server in Tehran.
Tougher cybersecurity regulations could be the final step for Stage 2 of the HITECH Act, which aims to implement electronic health records. The Centers for Medicare and Medicaid Services want hospitals to prove their EHRs are encrypted and secure.
The National Institute of Standards and Technology has released a new draft of its biometric identification standards.
The value of the global cybersecurity market will nearly double within the next five years, according to Markets and Markets.
The Federal Energy Regulatory Commission said it needs authority to enforce cybersecurity standards. The agency also wants Congress to expand its jurisdiction over electric grid operators.
Senate Majority Leader Harry Reid is expected to bring a stalled cybersecurity bill up for a floor vote by the end of next week. Lawmakers are still haggling over the final details but the bill's sponsor, Sen. Joe Lieberman, believes he'll have enough votes to pass the revised bill that includes compromises lessening the impact for private industry.
Homeland Security officials are warning fans of the Olympic Games to be wary of online hackers, who take advantage of highly-publicized events and popular news stories to entice users to click on malicious links that download viruses or prompt for credit card information.
The Army has awarded a contract for cyber maneuvering technology so that network administrators can stay a few steps ahead of hackers.
New guidelines could help agencies adopting bring-your-own-device strategies manage the potential risks smartphones and tablets could pose.
W. Hord Tipton, executive director of The International Information Systems Security Certification Consortium (ISC)2, talks about his tenure as CIO of the Department of the Interior, and what you can do to protect data at your agency.
July 17, 2012
The FBI wants an automated testing system that can handle all Android applications. Researchers are trying to standardize a technique called fuzzing that forces outside data into the apps to find weaknesses.
The U.S. Cyber Challenge's annual cybersecurity camp program is now underway. It will run through July 20. Invited participants will go through four days of intensive training aimed at assessing and recruiting top cybersecurity talent.