Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
NIST, charged with developing the nation's first-ever cybersecurity baseline for critical infrastructure, says its job is to provide technical assistance to companies, but industry itself must lead the way. Gen. Keith Alexander said NSA will review the use of contractors.
The White House released updated progress report on the cross-agency cybersecurity goals and found most agencies improved. The administration said more agencies are using smart cards to log onto their networks and more are implementing continuous monitoring.
Edward Snowden, a former technical assistant for the CIA and current employee of defense contractor Booz Allen Hamilton, revealed himself Sunday as the source of disclosures about the U.S. government's secret surveillance programs, risking prosecution by the U.S. government. Director of National Intelligence James Clapper called the revelation of the intelligence-gathering programs as reckless and said it has done "huge, grave damage."
The Veterans Affairs Department has been compromised by at least eight different nation state organizations that stole data from its systems, House lawmakers and other experts say. VA officials say there always are risks, but their computer security is better than ever before.
Jerry Davis, who served as the VA's chief information security officer until February 2013, testified at a House subcommittee hearing that the VA became aware of the computer hacking in March 2010 and that attacks continue "to this very day."
The Veterans Affairs Department denies claims that systems or data are in danger. But Jerry Davis, the former deputy assistant secretary for information security in VA's Office of Information and Technology, asserts in documents that he was bullied into signing security certifications that were deficient as a condition of his departure from VA for a new job at NASA.
Pentagon aircraft, missile defense programs said target of China cyber threat
The Homeland Security Department alerted employees in its headquarters office, and its Customs and Border Protection and Immigration and Customs Enforcement components that a vendor processing background investigations may have exposed personal data. DHS emphasizes there is no evidence of any lost or stolen information.
HHS approves Amazon Web Services for meeting security requirements under the Federal Risk Authorization Management Program. The company's secure documents are available for other agencies to review to help accelerate their move to the cloud.
The Defense Information Security Agency has approved a security guide for iOS 6 making it the third mobile operating system to meet the requirements this month. The agency said it will award a mobile device management system in a few months.
On this week's Capital Impact show, Bloomberg Government analysts discuss the cyber attack on Federal News Radio and WTOP, and the future of crowdfunding.
May 16, 2013
The company says both sites have been scrubbed of malware and vulnerabilities have been closed. The "drive-by" attack that affected the sites is a growing type of cyber hack that looks for holes in popular websites. FederalNewsRadio.com and WTOP.com are available again to users of all Internet browsers.
The news websites, FederalNewsRadio.com and WTOP.com, are accessible to all Internet users following resolution of a cyber attack against the websites. Users accessing the websites from all web browsers, including Internet Explorer, have full access to both websites.
Seven people were arrested in the U.S., accused of operating the New York cell of what prosecutors said was a network that carried out thefts at ATMs in 27 countries from Canada to Russia.
Out of an abundance of caution, Federal News Radio is continuing to block access to FederalNewsRadio.com via the Internet Explorer browser.
Three Department of Homeland Security components are testing how ongoing authorizations work. The Office of Management and Budget is drafting a memo to require agencies to change from approving the cybersecurity of systems every three years to a more regular oversight schedule.
On the one-year anniversary of the Digital Government Strategy, the CIO Council and DHS are expected to issue a security baseline and reference architecture for mobile computing. The goal of the document is not to give agencies new requirements but to focus on those security standards that are mobile-centric.
The Pentagon's mobile plan includes device approvals that will involve some up-front costs. The expectation is those costs will be quickly offset by eliminating the inefficiency of the slow, stovepiped and outdated approaches that have characterized DoD mobility up until now.
On this week's Capital Impact show, Bloomberg Government analysts will examine the reasons for the shortage of skilled worker visas, and the differences between U.S. and European approaches to cybersecurity.
May 2, 2013
Chase Garwood, the SBA acting CIO, said the agency is working with DHS and Justice to improve the security of its internal and external customer-facing systems.
May 1, 2013