bnv.fnr.news/technology;cybersecurity=stories;tile=1;pos=top;sz=728x90,970x90;ord=
1:54 pm, October 30, 2014

Cybersecurity News

Marines driving toward more active approach to cyber

The comply-to-connect initiative is about removing much of the people challenges by automating the software patching and updating the cyber processes in real time.

Friday - 05/30/2014, 01:35pm EDT
Listen

IG concludes VA's systems, data remain at risk

The 2013 FISMA report to Congress shows the Veterans Affairs Department continues to struggle with cybersecurity and has more than 6,000 items on its plans of actions and milestones and continued weaknesses in access and configuration management controls. VA CIO Stephen Warren details several initiatives to address many of the 35 recommendations.

Friday - 05/30/2014, 04:11am EDT

Former DoD deputy CIO Carey sees future of cyber in identity, data

Rob Carey, who recently retired after 31 years in government, said the government must focus on identity management and information assurance as computer threats become more complex and sustained.

Thursday - 05/29/2014, 11:36am EDT
Listen

DHS striving to avoid 'tragic mistake' under cyber program

Under the continuous diagnostics and mitigation program, DHS wants to ensure systems administrators have data on the most pressing threats and vulnerabilities first so they can fix them as soon as possible. John Streufert, DHS's director of federal network resilience, said the recently-awarded dashboard will be set up to do just that.

Thursday - 05/29/2014, 04:30am EDT
Listen

U.S. Cyber Command wants DISA to take greater role in DoD cyber defense

Under a construct that's still under discussion, the Defense Information Systems Agency would take charge of some portion of DoD's cyber defenses under a new Joint Force Headquarters.

Thursday - 05/29/2014, 03:46am EDT
Listen

Richard Stiennon, Security Analyst, IT Harvest

You are the key to stopping an insider threat and preventing a cyber incident at your agency even if you don't work in the IT department. Richard Stiennon is the host of the Security Current blog, the founder of IT Harvest and the author of Surviving Cyberwar. He says there are two categories of insider threats and identifying the most dangerous kind depends on you.

Wednesday - 05/28/2014, 05:59pm EDT
Listen

Landing that federal job -- a recruiter's perspective

Talent acquisition manager Mike Bruni will discuss how to get a job in what is a competitive and challenging federal market.
May 23, 2014

Friday - 05/23/2014, 08:50pm EDT
Listen

Dan Waddell, Director of Government Affairs, (ISC)2

Few matters have vexed the government as much as cybersecurity. Just recently, officials from the Homeland Security Department pressed Congress for the umpteenth time to pass legislation clarifying who's supposed to do what to protect federal networks. Dan Waddell, who has long cybersecurity experience in government and industry, has just become the director of government affairs for the training and certification group, (ISC)2. He joins the Federal Drive with Tom Temin and Emily Kopp to discuss the biggest cyber challenges agencies still face.

Friday - 05/23/2014, 09:54am EDT
Listen

DARPA launches challenge to help create hacker-proof software

The Cyber Grand Challenge, set to launch for the first time two weeks from now, aims to encourage the development of computing systems that can seek out cybersecurity weaknesses better than humans can.

Thursday - 05/22/2014, 01:48pm EDT
Listen

DHS' push for clearer cyber authorities moves to the House

Larry Zelvin, the director of the National Cybersecurity and Communications Integration Center in DHS's National Protection and Programs Directorate, is expected to tell the House Homeland Security Committee Wednesday that the implementation of the advanced intrusion detection and prevention program known as Einstein is hampered by the lack of clarity of the exact role DHS is allowed to play under the current set of cybersecurity laws.

Wednesday - 05/21/2014, 06:10am EDT

Telework brings out underlying trust issues in federal workforce

Trust boils down to workers demonstrating a sense of reliability and consistency. With reliability and consistency, "people begin to depend on each other to get things done in the workplace." Without it, an agency can be doomed, says Michael Gelles of Deloitte.

Wednesday - 05/21/2014, 05:03am EDT
Listen

Insider threat programs must find the right 'trust but verify' balance

NSA, State and nearly every other agency are developing "fixes" to protect unauthorized employees from taking data. Experts say employees need to understand why the rules are in place and how they benefit both the organization and worker. OMB says one way to improve the situation is by reducing the number of federal employees with security clearances-an initiative that already is underway.

Wednesday - 05/21/2014, 03:56am EDT
Listen

How much damage has Chinese hacking done to the US government?

A government report indicates more than 40 Pentagon weapons programs and nearly 30 other defense technologies have been compromised by cyber intrusions from China. The cybersecurity firm Mandiant issued a report last year alleging links between a secret Chinese military unit and years of cyber-attacks against U.S. companies. Alcoa World Alumina, Westinghouse Electric Co., Allegheny Technologies, U.S. Steel Corp., the United Steelworkers Union and Solar-World are just six companies the Justice Department says were victims of Chinese hacking. U.S. officials suggest there are many more amounting to billions of dollars in economic losses.

Tuesday - 05/20/2014, 05:47pm EDT

All things contracting with IBM's Anne Altman

Anne Altman, general manager of Federal Government for IBM, will discuss a wide range of contracting topics with host Mark Amtower.
May 19, 2014

Monday - 05/19/2014, 09:48pm EDT
Listen

Richard Stiennon, cybersecurity analyst

Software assurance policies could be a foundation principle for cybersecurity at your agency in the next five years. That's a prediction from Richard Stiennon, the host of the Security Current blog, the founder of IT Harvest and the author of Surviving Cyberwar. Stiennon tells In Depth with Francis Rose he sees a cybersecurity culture shift inside the beltway.

Monday - 05/19/2014, 05:03pm EDT
Listen

Senate committee eyes new cyber hiring authorities for DHS

Sen. Tom Carper (D-Del.), chairman of the Homeland Security and Governmental Affairs Committee, said Thursday the committee plans to mark up a bill on May 21 to give DHS more tools to hire cyber workers more easily.

Friday - 05/16/2014, 12:24pm EDT

Ron Ross, Computer Scientist, NIST

The National Institute of Standards and Technology has launched a four-part plan to help agencies build more secure IT systems. NIST Computer Scientist Ron Ross, who guided a new publication on the issue, tells the Federal Drive with Tom Temin and Emily Kopp that the same engineering principles that apply to bridges and buildings should apply to IT. That is, security should be built in, not added later.

Thursday - 05/15/2014, 02:16pm EDT
Listen

Cyber Aces competition offers hackers chance to hone skills

Rising stars in the cybersecurity field came together at the University of Massachusetts Boston recently to hone their skills.

Friday - 05/09/2014, 03:59pm EDT

Inside the Reporter's Notebook: GSA takes 18F on a magical mystery tour

In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.

Friday - 05/09/2014, 03:27pm EDT

Red tape delayed federal network fixes to Heartbleed vulnerability by several days

DHS says it found out about the Heartbleed vulnerability at the same time everyone else did. But unlike most other organizations, it had to wade through layers of legal negotiations before it could help federal agencies fix the cyber vulnerability in their own systems.

Friday - 05/09/2014, 03:47am EDT
Listen
  •  
  • 7
  •