bnv.fnr.news/technology;cybersecurity=main;tile=1;pos=top;sz=728x90,970x90;ord=
10:35 am, October 23, 2014

Cybersecurity News

Jane Holl Lute, President and CEO, Council on Cybersecurity

The Senate would like to grant new powers to federal chief information officers and update federal IT laws that haven't gotten much attention for the past dozen years. Those are a couple of the effects of new legislation the Senate Homeland Security and Governmental Affairs approved recently. One of the bills is the Senate version of the Federal IT Acquisition Reform Act -- the other is an update to the Federal Information Security Modernization Act, which Senators have been trying to modify for the past several years, without much success. She said on In Depth with Francis Rose the proposals are a big step in the right direction.

Monday - 07/07/2014, 04:06pm EDT
Listen

State on path toward recovery after harsh IG report on cyber

Bill Lay, the State Department's chief information security officer, said his budget for cybersecurity doubled in 2014 to help address the recommendations outlined by the agency's inspector general.

Wednesday - 07/02/2014, 02:07pm EDT

NSA revamps processes to more quickly approve commercial technology

The National Information Assurance Partnership, the U.S. implementation of what was supposed to be a faster, cheaper process to verify the cybersecurity of commercial IT products, turned out to be so slow and expensive that few companies could afford to go through it. But officials said they hope a recent overhaul in the procedures will breathe new life into the program.

Wednesday - 07/02/2014, 04:35am EDT
Listen

GSA, DHS about ready to turn the spigot on for a new set of cyber tools

The General Services Administration and the Homeland Security Department are putting the final touches on the next set of contracts that will truly kickstart the federal move toward dynamic cybersecurity protections of agency networks and computers. The two agencies will release six task orders under the $6 billion CDM program in the coming year to implement tools and services across more than 40 agencies.

Wednesday - 07/02/2014, 04:08am EDT
Listen

Inside the DoD Reporter's Notebook: DoD releases missing piece of 2015 budget; defense acquisition 'good enough'

The Defense Department's request for its overseas contingency operations is about $20 billion less than initial estimates. Former Defense officials say realistic goals and managed expectations usually spelled success for weapons systems.

Monday - 06/30/2014, 04:49am EDT

DHS S&T antes up $95M for cyber research, development

The Science and Technology Directorate issued a Broad Agency Announcement and four specific solicitations to get industry, academia and others thinking about how to improve cybersecurity. Over the next nine months, the agency will review white papers, proposals and make awards, with expectations of the development of commercial or open source projects in the next year or two.

Friday - 06/27/2014, 04:02am EDT
Listen

Small government agencies have ground to make up in privacy, cybersecurity compliance

A new report from the Government Accountability Office suggests the Department of Homeland Security and the Office of Management and Budget need to take a more active role in monitoring and guiding small agencies when it comes to their security and privacy-protection programs.

Thursday - 06/26/2014, 03:33pm EDT

Army issues new policy to gain better control over enterprise apps

Lt. Gen. Robert Ferrell, the Army's CIO/G6, said the service now is requiring all enterprise software titles to be modernized, virtualized and migrated to an approved data center.

Thursday - 06/26/2014, 07:57am EDT
Listen

Robert Anderson, Executive Assistant Director, FBI

The Justice Department has rewritten the playbook on catching cyber criminals. It recently led an international effort to disrupt a global cybertheft ring. A Russian-led gang allegedly stole millions of dollars by infecting computers with malware known as Gameover Zeus. Robert Anderson is the executive assistant director of the Criminal, Cyber Response and Services Branch at the FBI. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss how the sting operation worked.

Wednesday - 06/25/2014, 10:34am EDT
Listen

Senate's version of FISMA update cleans up around the cyber edges

The Senate Homeland Security and Governmental Affairs Committee members will introduce and markup the Federal Information Security Modernization Act of 2014 Wednesday. The bill would require OMB to rescind a major section of Circular A-130 in order to fix long-standing complaints with FISMA's reauthorization requirements.

Tuesday - 06/24/2014, 05:14pm EDT

DHS to take 'multi-threat' approach to fighting terrorism, cyber attacks

The Homeland Security Department will channel its efforts into battling terrorism, cyber threats and natural disasters, according to a quadrennial review the agency released Wednesday.

Monday - 06/23/2014, 10:55am EDT

Inside the Reporter's Notebook: DATA Act is law, IT, acquisition A-11 changes

In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities. Senate lawmakers prepare to mark-up IT reform bill next week. CIO's spend time at camp where OMB and others emphasize the word of the year: effectiveness.

Friday - 06/20/2014, 04:32pm EDT

Mari Galloway, Women's Society of Cyber Jutsu

It's no secret the U.S. faces some big challenges with the size and capacity of its cybersecurity workforce. But putting a finer point on those challenges isn't as easy. An all-week event at Virginia Tech tried to answer those questions. At the 2014 U.S Cyber Challenge Summer Cyber Camp, attendees got intensive training on discrete cyber skills but also an overview of the overall workforce shortage, and where their specialized skills might be able to help. Mari Galloway, director of finance for the Women's Society of Cyber Jutsu, was one of the 45 participants in this week's event. She tells In Depth with Francis Rose about a few of her main takeaways.

Friday - 06/20/2014, 04:29pm EDT
Listen

Cloud forecast means changes for federal IT workers

As government agencies migrate to cloud computing and other new technologies, the information technology workforce requirements are changing.

Thursday - 06/19/2014, 03:46pm EDT

DoD's own testing of cloud security standards

The Defense Department's testing its own version of cybersecurity standards for cloud systems. The Defense Information Systems Agency is working with all the military branches to find a cybersecurity program that protects the cloud with Level-3 security requirements. DISA's enterprise cloud broker is conducting the software tests. DoD's chief of the risk management oversight division in the chief information officer's office,Kevin Delaney, isn't sure when the tests will be over. He says the development needs to run incrementally so each level of security controls are working right. The tests are coinciding with the deadline for agency cloud systems to earn security certification through the Federal Risk and Authorization Management Program. Right now FedRAMP offers cloud certification for low to moderate security levels.

Thursday - 06/19/2014, 10:31am EDT

DoD to test cloud security requirements above, beyond FedRAMP

DISA is working with the services to identify a mission-critical application in the cloud to ensure the additional requirements for Level-3 security are appropriate and achievable. Meanwhile, the FedRAMP program office is beginning to consider what the program will look like in two to three to five years.

Thursday - 06/19/2014, 04:01am EDT
Listen

On DoD: NSA's Cyber Incident Response program

Chandra McMahon, Lockheed Martin's vice president for commercial markets, discusses NSA's accreditation system that tests cybersecurity companies against 21 separate focus areas.

Wednesday - 06/18/2014, 02:48pm EDT
Listen

White House cyber czar's goal: 'Kill the password dead'

Michael Daniel, the Obama administration's cybersecurity coordinator, says he wants to dismantle the most common method of cyber protection: passwords. Even as cyber threats continue to grow more sophisticated and destructive, passwords are weakening and proving easier to crack than ever. The solution lies in the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls for a broad "identity ecosystem" to replace simple passwords.

Wednesday - 06/18/2014, 12:06pm EDT

Senate backs wide array of cyber projects in 2015 approps bill

Cybersecurity projects and programs are getting some hefty backing from the Senate.

Monday - 06/16/2014, 09:14am EDT

Jason Miller, Executive Editor, Federal News Radio

The Federal Communications Commission is challenging telecoms to work more closely with it to improve the nation's cybersecurity. FCC Chairman Tom Wheeler says he is not planning more regulations, rather he is asking the companies to share responsibility. Federal News Radio's Executive Editor Jason Miller joined Tom Temin and Emily Kopp on the Federal Drive to discuss the FCC's plans. Read Jason's related article.

Friday - 06/13/2014, 10:45am EDT
Listen
  •  
  • 5
  •