bnv.fnr.news/technology;cybersecurity=stories;tile=1;pos=top;sz=728x90,970x90;ord=
4:15 am, August 30, 2014

Cybersecurity News

Mixed Messages for NSA

Utah lawmakers are sending mixed messages to the National Security Agency, which runs a massive data-storage warehouse outside of Salt Lake City. One proposal is calling for legislators not to collect utility taxes from the center. Meanwhile, another lawmaker wants to cut off water to the center, which uses more than 1 million gallons daily to cool its computer processers.

Friday - 02/14/2014, 04:25pm EST

Rollout of the cybersecurity framework

On this week's Capital Impact show, executives from Liberty Group Ventures discuss the roll out of the administration's new cyber framework and how it will affect the private sector.
February 13, 2014.

Thursday - 02/13/2014, 12:25pm EST
Listen

What they're saying about the cybersecurity framework

Government officials, associations and companies are offering insight and comments on the recently released White House cyber framework.

Thursday - 02/13/2014, 08:51am EST

White House cyber framework focuses on flexibility, risk for critical infrastructure providers

NIST led the year-long effort to develop the Framework for Improving Critical Infrastructure Cybersecurity. Agencies now must review regulations to ensure alignment with the framework. DHS also launches a new voluntary program that will offer access to a variety of federal resources to help companies improve cybersecurity.

Wednesday - 02/12/2014, 04:15pm EST

FINRA reviewing security

The Financial Industry Regulatory Authority is looking at the measures that Wall Street's brokerages take to protect their businesses and customers from cyber security threats. FINRA, which conducts periodic "sweeps," or targeted checks on Wall Street brokerages, says it is conducting the review, in part, because of the growing threat to information technology systems from "a variety of sources.

Monday - 02/10/2014, 08:46am EST

Bank Customers Targeted in scam

App River email and security experts says Bank of America customers have been targeted by a new virus campaign they're calling a Bredo virus. It comes in the form of phishing email that claiming to be from BofA and asking the recipient of download a security file. The main goal of this virus is to steal information such as banking info or recording keystrokes. The software may also have abilities to further infect a system by downloading more malware on to the machine.

Monday - 02/10/2014, 08:44am EST

Emergency zombie warnings make Coburn's list of federal cyber failures

Sen. Tom Coburn's (R-Okla.) report on cybersecurity and critical infrastructure in the federal government examined more than 40 inspector general audits and revealed gaping holes in the security of agencies' systems.

Thursday - 02/06/2014, 10:44am EST

IGs to propose cyber maturity model to better gauge federal cyber health

The goal is to more accurately evaluate the security of the government's computer networks and systems. These efforts could bring more consistency to the cyber auditing process and engender more confidence in its results.

Thursday - 02/06/2014, 04:45am EST
Listen

DHS sees a wave of information sharing as the key to raising all cyber boats

Phyllis Schneck, the deputy undersecretary for cybersecurity in the National Protection and Programs Directorate at DHS, said the department's goal is to further the trust relationship with industry around sharing and understanding cybersecurity threats.
February 6, 2014

Wednesday - 02/05/2014, 01:45pm EST
Listen

Agencies experiencing a widening cybersecurity reality gap

The inconsistent way inspectors general review the security of federal networks and computers is causing uncertainty around what is working and what isn't in the federal government. A recent State Department IG management alert is a prime example of this growing disconnect.

Wednesday - 02/05/2014, 04:54am EST
Listen

DHS satisfied with privacy safeguards in new data sharing programs

Early pilots in DHS information sharing project appears to show that bureau-level IT systems built decades ago can share information with one another, and also protect against data privacy problems.

Monday - 02/03/2014, 04:02am EST
Listen

Are you ready for the next big cyber deadline?

Former federal CISO Pat Howard offers tips to waterproof your agency's information security continuous monitoring strategy.

Friday - 01/31/2014, 12:08pm EST

DHS revs up its part of the cyber executive order

Phyllis Schneck, the deputy undersecretary for cybersecurity at DHS, said the department will release a voluntary cyber program on Feb. 14 as part of the deliverables under President Barack Obama's 2013 Executive Order. Schneck said among her top priorities is to continue to build a trust relationship with the assorted public and private sector stakeholders.

Friday - 01/31/2014, 04:11am EST
Listen

Recommendations attempt to raise acquisition, cyber consciousness

GSA and DoD release six suggestions for how to better integrate cybersecurity in the acquisition progress. The recommendations are one of the deliverables under the cyber Executive Order President Obama signed last February. GSA will release a RFI in the coming weeks to let industry and others comment on how best to begin implementation.

Thursday - 01/30/2014, 04:20am EST
Listen

Agencies settling in on better privacy controls

More agencies are recognizing the growing importance of keeping data private after recent information leaks and cyber breaches. The Federal Trade Commission is among the agencies at the head of the pack and is relying on best practices.

Wednesday - 01/29/2014, 03:45am EST
Listen

House Veterans Committee adds latest VA cyber breach to ongoing investigations

Rep. Jeff Miller (R-Fla.) wants answers from the Veterans Affairs Department after its latest privacy and cyber breach of the data of more than 5,000 veterans through its eBenefits portal. VA says it has fixed the software defect and its Data Breach Core Team is investigating what happened.

Monday - 01/27/2014, 03:57am EST

12 ways to better merge cloud services with ongoing cyber initiatives

A new white paper from SafeGov recommended ways for agencies to move to an integrated cloud and cyber approach and away from one that is fragmented and ad hoc in many respects. Karen Evans, a co-author of the report and a former Office of Management and Budget administrator for e-government and IT, said agencies need a clearer picture of how this integration could happen.

Thursday - 01/23/2014, 04:09am EST
Listen

DISA's commercial cloud strategy remains a work in progress

The Defense Information Systems Agency says an eventual commercial cloud buy probably won't be bundled into a single contract vehicle, but in the meantime, DoD needs to work through challenges involving security, approval policy and network operations.

Wednesday - 01/22/2014, 04:30am EST
Listen

Evidence of system hacks varies

How can you tell if your system has been compromised? Internet security firm Mandiant says there are numerous signs. Included are evidence of unauthorized use of valid accounts, trace evidence & partial files, command and control activity, known and unknown malware, suspicious network traffic, valid programs used for other purposes and files that have obviously been accessed by attackers. IT managers are reminded that threats can slip in undetected and lay dormant for long periods of time before striking.

Tuesday - 01/21/2014, 10:26am EST

Online shopping rules evolve

How do you shop securely online. The Center for Internet Security says you should "know your online merchants. Limit online shopping to merchants you know and trust. Only go to sites by directly typing the URL in the address bar. If you are unsure about a merchant, check with the Better Business Bureau or the Federal Trade Commission to ensure its legitimacy. Confirm the online seller's contact information in case you have questions or problems. Use a credit card, not a debit card. Credit cards are protected by the Fair Credit Billing Act and may reduce your liability if your information is used improperly.

Tuesday - 01/21/2014, 10:25am EST
  •  
  • 8
  •