Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
The House approved the first spending bill for 2013, setting operating budgets for the Commerce and Justice Departments and for science-related agencies, such as NASA.
The Manufacturing Extension Partnership has a goal of making U.S. manufacturers more competitive.
CIO Del Brockett said he's taking a two-pronged approach to provide better service to employees and the public. He said innovation through pilots with the labs show the value of emerging technologies.
April 26, 2012
A working group is developing common requirements for a federated cloud identity management shared service. NIH already showed how this could be done with its iTrust tools. The tiger team is expected to issue the common standards in the next few months.
Digital signatures are mathematical algorithms that ensure authenticity of digital documents. They are specified in Federal Information Processing Standard, or FIPS 186 — 3. The standard first came out in 1994.
GSA, NIST to name the first batch of outside organizations who will test and validate commercial cloud products against baseline security standards in the FedRAMP cloud security program in May. The Joint Authorization Board also will release guidance to industry on how to implement the security requirements in the coming months. FedRAMP still is months from approving its first set of vendors.
The National Institute of Standards and Technology has asked for comments about its proposed revisions to the Digital Signatures Standard.
Conformity assessment is "determining if people, products and services meet requirements," said Gordon Gillerman, the director of standards services for the National Institute of Standards and Technology.
A new Internet Botnet Group will bring together federal and industry experts to try to stem the tide against botnet attacks. Experts estimate one in 10 computers are controlled by bad actors using malicious software to attack organizations. FCC working groups released three reports with recommendations for improve cybersecurity.
Marianne Swanson, a senior adviser for information security at NIST, joined In Depth with Francis Rose to discuss NIST's final framework for Smart Grid security.
The National Institute of Standards and Technology has issued a major revision to the Federal Information Security Management Act, which governs agency information security policies. Ron Ross, a NIST fellow and the agency's FISMA implementation project leader, joined In Depth with Francis Ross to discuss the FISMA additions.
The National Institute of Standards and Technology released the first draft of special publication 800-53 revision 4 yesterday.
Melissa Taylor, who works in the Law Enforcement Standards Office at the National Institute of Standards and Technology, worked with the Justice Department on recommendations for reducing human error in fingerprint analysis.
NIST's 2012 appropriations provided $10 million to establish the center near NIST's Gaithersburg, Md., campus.
The University of Maryland has published a report, in collaboration with NIST, on how the government and industry are addressing the cyber supply chain challenge.
New draft guidance is giving agencies some help in responding to the ever-changing landscape of cyber threats.
The password isn't dead yet, but "we think it needs to be shot," said Jeremy Grant, NIST's senior advisor for identity management, in an interview with The Federal Drive with Tom Temin.
The National Institute of Standards and Technology is sponsoring an upcoming conference to bring together industry and agencies to figure out ways to improve how they use unstructured data.
The agency will fund five-to-eight projects between $1.25 million and $2 million for up to two years. The pilot programs will cover NSTIC's four principles to make identity management secure, interoperable, privacy-enhancing and cost effective.