Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
The House approved the first spending bill for 2013, setting operating budgets for the Commerce and Justice Departments and for science-related agencies, such as NASA.
The Manufacturing Extension Partnership has a goal of making U.S. manufacturers more competitive.
CIO Del Brockett said he's taking a two-pronged approach to provide better service to employees and the public. He said innovation through pilots with the labs show the value of emerging technologies.
April 26, 2012
A working group is developing common requirements for a federated cloud identity management shared service. NIH already showed how this could be done with its iTrust tools. The tiger team is expected to issue the common standards in the next few months.
Digital signatures are mathematical algorithms that ensure authenticity of digital documents. They are specified in Federal Information Processing Standard, or FIPS 186 — 3. The standard first came out in 1994.
GSA, NIST to name the first batch of outside organizations who will test and validate commercial cloud products against baseline security standards in the FedRAMP cloud security program in May. The Joint Authorization Board also will release guidance to industry on how to implement the security requirements in the coming months. FedRAMP still is months from approving its first set of vendors.
The National Institute of Standards and Technology has asked for comments about its proposed revisions to the Digital Signatures Standard.
Conformity assessment is "determining if people, products and services meet requirements," said Gordon Gillerman, the director of standards services for the National Institute of Standards and Technology.
A new Internet Botnet Group will bring together federal and industry experts to try to stem the tide against botnet attacks. Experts estimate one in 10 computers are controlled by bad actors using malicious software to attack organizations. FCC working groups released three reports with recommendations for improve cybersecurity.
Marianne Swanson, a senior adviser for information security at NIST, joined In Depth with Francis Rose to discuss NIST's final framework for Smart Grid security.
The National Institute of Standards and Technology has issued a major revision to the Federal Information Security Management Act, which governs agency information security policies. Ron Ross, a NIST fellow and the agency's FISMA implementation project leader, joined In Depth with Francis Ross to discuss the FISMA additions.
The National Institute of Standards and Technology released the first draft of special publication 800-53 revision 4 yesterday.
Melissa Taylor, who works in the Law Enforcement Standards Office at the National Institute of Standards and Technology, worked with the Justice Department on recommendations for reducing human error in fingerprint analysis.
NIST's 2012 appropriations provided $10 million to establish the center near NIST's Gaithersburg, Md., campus.
The University of Maryland has published a report, in collaboration with NIST, on how the government and industry are addressing the cyber supply chain challenge.
New draft guidance is giving agencies some help in responding to the ever-changing landscape of cyber threats.
The password isn't dead yet, but "we think it needs to be shot," said Jeremy Grant, NIST's senior advisor for identity management, in an interview with The Federal Drive with Tom Temin.
The National Institute of Standards and Technology is sponsoring an upcoming conference to bring together industry and agencies to figure out ways to improve how they use unstructured data.
The agency will fund five-to-eight projects between $1.25 million and $2 million for up to two years. The pilot programs will cover NSTIC's four principles to make identity management secure, interoperable, privacy-enhancing and cost effective.