Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
A Nazi hacker group is claiming credit for shutting down Twitter yesterday morning. The micro-blogging site said the outage was caused by a server bug, not hackers.
House Intelligence Committee Chairman Mike Rogers said he'd be "very careful" about assigning blame for the attacks on Iran's nuclear program. Half of what's been reported in the media on the matter is untrue, he said.
The U.S. Agency for International Development saw
their FISMA scores drop to an F grade. Jerry
Horton, USAID's chief information officer, said
they will fix their shortcomings this year.
June 21, 2012
NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.
The Air Force has awarded Northrop Grumman a three-year contract to upgrade cryptography in the country's intercontinental ballistic missile system.
The National Security Agency and the CIA helped Israel develop the "flame" computer virus.
Gordon Gillerman and Matt Scholl of NIST discuss standards, certification and accreditation with host John Gilroy.
June 19, 2012(Encore presentation December 25, 2012)
Kaspersky Labs spotted malware disguised as a fake security app called "Android Security Suite Premium," Computerworld reports. The malware is a threat to everyday smartphone users as well as businesses that allow employees to use personal devices on the network.
After breaking into the network, the man allegedly tried to sell access to DoE for $50,000.
The Cybersecurity Technologies Research Lab's goals include building the scientific foundation for cybersecurity research, developing critical relationships and testing solutions in real-world situations.
Federal agencies running virtualized computer systems might be vulnerable to a new cyber attack. The warning comes from the U.S. Computer Emergency Readiness Team.
Last week it accidentally posted the home addresses of its newest top-level domain-name applicants, Government Computer News reports.
Sen. Joe Lieberman says there should be a special counsel to look into allegations that the administration has leaked information on a U.S.- Israeli cyber-warfare campaign against Iran's nuclear program and other classified activities.
The chief financial officer of what had been one of the nation's largest private mortgage companies has been sentenced to five years in prison for his role in a $3 billion fraud scheme.
Health and Human Services has named entrepreneur Bryan Sivak as its chief technology officer. He replaces Todd Park, who moved on to the White House.
The Homeland Security Department showed lawmakers and staff how easy it is to create a spear phishing attack against a federal employee using free, open-source tools. The agency also said the Einstein 3 program is under development and will rely on vendors to provide intrusion prevention services. Sen. Joe Lieberman (I-Conn.) said he expects the cyber bill to go to the Senate floor for debate no later than July.
Gen. Keith Alexander, who runs the National Security Agency, endorsed the idea of using a cloud computing facility to share cybersecurity information with the private sector.
Heidi Avery is deputy assistant to the President for homeland security, on the National Security Staff.
The deal will help Northrup broaden its client portfolio amid dwindling defense sales and concerns about sequestration.
The cover up, as they say, is almost always worse than the crime itself. The rule of thumb, from the Watergate era, is follow the money, although people rarely do that. Following the money can be tricky. Also complicated. Especially in the computer age with multi- national players, Senior Correspondent Mike Causey says.