Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
T.K. Keaninni, chief technology officer for nCircle joins host John Gilroy to talk about how his company can help your agency with its network security issues.
June 26, 2012
The IT Alliance has called for an international call for cooperation between your agency and the private sector. The organization of IT security groups from the U.S., Europe and Japan. The statement, called "Recommended Government Approaches to Cybersecurity," includes 12 points, including transparency and the need to to adapt to market changes.
MI-5 chief Jonathan Evans said government secrets, infrastructure and intellectual property are at stake. He described the scale of the threats as "astonishing" in his first public speech in two years, just ahead of the London Olympics.
A data breach at the U.S. Commodity Futures Trading Commission in May did not compromise any trading or market data, the agency's chief information officer John Water said. CFTC said it will implement additional security controls and increase training for employees. The agency will also provide identity protection for employees through a credit monitoring company.
Ryan Cleary, 20, and Jake Davis, 19, pleaded guilty to conspiring with other members of LulzSec to attack government, media, and law enforcement websites last year, according to Gryff Waldron, an official at London's Southwark Crown Court.
Five Republican senators have introduced a bill that would require companies that store your personal information to report any security breaches to you as quickly as possible.
Rosemary Wenchel is the new deputy assistant secretary for cybersecurity coordination at DHS. She replaces Adm. Mike Brown, who retired in January.
A coalition of IT industry associations are calling for a consistent set of global cybersecurity policies.
A Nazi hacker group is claiming credit for shutting down Twitter yesterday morning. The micro-blogging site said the outage was caused by a server bug, not hackers.
House Intelligence Committee Chairman Mike Rogers said he'd be "very careful" about assigning blame for the attacks on Iran's nuclear program. Half of what's been reported in the media on the matter is untrue, he said.
The U.S. Agency for International Development saw
their FISMA scores drop to an F grade. Jerry
Horton, USAID's chief information officer, said
they will fix their shortcomings this year.
June 21, 2012
NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.
The Air Force has awarded Northrop Grumman a three-year contract to upgrade cryptography in the country's intercontinental ballistic missile system.
The National Security Agency and the CIA helped Israel develop the "flame" computer virus.
Gordon Gillerman and Matt Scholl of NIST discuss standards, certification and accreditation with host John Gilroy.
June 19, 2012(Encore presentation December 25, 2012)
Kaspersky Labs spotted malware disguised as a fake security app called "Android Security Suite Premium," Computerworld reports. The malware is a threat to everyday smartphone users as well as businesses that allow employees to use personal devices on the network.
After breaking into the network, the man allegedly tried to sell access to DoE for $50,000.
The Cybersecurity Technologies Research Lab's goals include building the scientific foundation for cybersecurity research, developing critical relationships and testing solutions in real-world situations.
Federal agencies running virtualized computer systems might be vulnerable to a new cyber attack. The warning comes from the U.S. Computer Emergency Readiness Team.
Last week it accidentally posted the home addresses of its newest top-level domain-name applicants, Government Computer News reports.