Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
The National Institute of Standards and Technology wants comments on new draft guidelines for securing Basic Input Output System systems. BIOS is the first software activated after turning a computer on and has increasingly become a new target for hackers.
A proposed rule would make contractors responsible for securing networks that store any type of government information. It defines key terms like information and "information system."
Marine Lt. Gen Richard Mills told an audience at a conference in Baltimore last that he led cyber attacks in Afghanistan.
The plan calls for the creation of two new bodies. The Cyber Investment Management Board would oversee cyber acquisition, and a Cyber Capabilities Team would look at technology and policy requirements.
Maj. Gen. John Davis moves up from the position of director of current operations at the Cyber Command.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command
The fixes plug vulnerabilities in Flash Player. If left untreated, they could cause a system crash or allow attackers to take control of a computer.
If the claims are true, it means hackers could spy on network traffic, obtain credentials to get on the inside and attack the power plants.
The research agency DARPA is hosting a daylong event Sept. 27 on its upcoming "Plan X" that focuses on building solid attack strategies and tools.
The department is trying to figure out the best way to manage the cards of contract employees after they leave the department. Every agency using a managed service provider for secure identity card issuance faces a similar challenge. Commerce also is working on integrating physical and logical access systems.
Sources say the Defense Department is behind on implementing the new plan and may in fact be exploring other options.
The Army chief information officer said the military service was well on its way to completely migrating to the cloud-based email by March.
The military, working through DARPA, is trying to develop its own marketplace of apps for helping troops in the field.
They say hackers who want to steal cars or just eavesdrop on conversations may have an easy time of it.
ikileaks founder Julian Assange portrayed himself Sunday as a victim of an American "witch hunt."
OMB issued fiscal 2014 technology project guidance detailing the steps agencies should take to reduce spending across six areas. Agencies also must tell OMB how it would reinvest the savings into new or innovative projects.
The command hopes to attract cyber pros with special incentives, including bonuses and education benefits.
A Google spokesman said he company plans to enhance it apps with functions already offered by Postini, an email security company owned by Google.
The National Institute of Standards and Technology is working on updating guidelines for Transport Layer Security. That technology prevents anyone from eavesdropping on Internet communications.
The Defense Department's goal is to enhance training and cyber situational awareness.