Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
Unmanned drones are vulnerable to computer hacking that could allow outside force to control them, according to new research.
Former White House Cyber Coordinator Howard Schmidt, who retired in May, has landed back in the private sector. Schmidt will join Qualys, a company specializing in information security and compliance cloud solutions.
The department responsible for keeping the government safe from cyber threats could use some help of its own when it comes to securing mobile devices.
The government is investigating allegations against Symplicity Corp. for allegedly accessing without permission the internal networks of two competitors in the education sector. Symplicity, which runs three governmentwide websites, denies any wrongdoing and calls the government's search warrant a one-sided justification for the investigation. Experts say the company could face suspension from new federal procurements.
Hackers broke into computers at hotel giant Wyndham Worldwide Corp. three times in two years and stole credit card information belonging to hundreds of thousands of customers. Wyndham didn't report the break-in in corporate filings even though the Securities and Exchange Commission wants companies to inform investors of cybercrimes.
Veterans Affairs would have to contact victims of data breaches within 10 days under a bill approved by a House subcommittee.
NIST launched the National Cybersecurity Center of Excellence in February and now is giving industry details on how it will work. The center's goal is to bring businesses and government together to solve cyber problems.
Homeland Security releases policy and guidance on how departments and vendors will implement continuous monitoring and get away from static reports on the cyber health of their systems. DHS is hoping Congress approves a $200 million funding request to buy five different commercial cyber tools, a dashboard and a security data warehouse in 2013.
The pressing need for cybersecurity legislation has led to widely divergent paths in the House and Senate. The House has opted for a more incremental approach, while the Senate has crafted comprehensive legislation
Hackers that attacked the Central Intelligence Agency and the Defense Department have pleaded guilty to those attacks in a court in London, SC Magazine reported.
Federal officials have arrested two dozen hackers in a cyber-crime ring that stretches from Japan to middle America.
Homeland Security is getting serious about making sure all federal agencies get on board with continuous network monitoring. Keeping a vigilant eye out is the best way to fend off cyber attacks, DHS officials say.
Lawmakers have about 23 real work days left before the end of the fiscal year to pass USPS reform, comprehensive cyber, DoD authorization and all the 2013 spending bills. Experts hold out little hope even after the passage of the FDA bill and the expected approval of the highway legislation.
T.K. Keaninni, chief technology officer for nCircle joins host John Gilroy to talk about how his company can help your agency with its network security issues.
June 26, 2012
The IT Alliance has called for an international call for cooperation between your agency and the private sector. The organization of IT security groups from the U.S., Europe and Japan. The statement, called "Recommended Government Approaches to Cybersecurity," includes 12 points, including transparency and the need to to adapt to market changes.
MI-5 chief Jonathan Evans said government secrets, infrastructure and intellectual property are at stake. He described the scale of the threats as "astonishing" in his first public speech in two years, just ahead of the London Olympics.
A data breach at the U.S. Commodity Futures Trading Commission in May did not compromise any trading or market data, the agency's chief information officer John Water said. CFTC said it will implement additional security controls and increase training for employees. The agency will also provide identity protection for employees through a credit monitoring company.
Ryan Cleary, 20, and Jake Davis, 19, pleaded guilty to conspiring with other members of LulzSec to attack government, media, and law enforcement websites last year, according to Gryff Waldron, an official at London's Southwark Crown Court.
Five Republican senators have introduced a bill that would require companies that store your personal information to report any security breaches to you as quickly as possible.
Rosemary Wenchel is the new deputy assistant secretary for cybersecurity coordination at DHS. She replaces Adm. Mike Brown, who retired in January.