Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
This fall, five more schools will offer an intensive science, technology, engineering and math (STEM) education track to students who are serious about federal cybersecurity careers. These Centers of Academic Excellence are overseen jointly by the National Security Agency and the Homeland Security Department. Schools have to pass a meticulous screening process to qualify for the program. Steve LaFountain is dean of the NSA's College of Cyber. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss the new move.
The National Association of Corporate Directors' (NACD) Handbook on Cyber-Risk Oversight, introduced Tuesday at the National Press Club in Washington, outlines five key principles that aim to move forward the collaborative cybersecurity effort.
The cyber attacks on small federal agencies demonstrate the cyber domain is an ecosystem, and the federal government is one of many different cyber cultures. One expert says a map of the different cultures can help agencies prevent cyber attacks. Ben Fitzgerald is senior fellow and director of the Technology and National Security Program at the Center for a New American Security. He explained that and other cybersecurity strategies on In Depth with Francis Rose.
Chief legal counselor to NSA says intelligence disclosures may have set back efforts to improve nation's cybersecurity posture because of increasing unease about public-private cooperation, and that it's time to reexamine the digital privacy trust relationship between government and the public.
Larry Zelvin is stepping down as the director of DHS's National Cyber and Communications Integration Center (NCIC) next month after almost 30 years of government service.
Inside the DoD Reporter's Notebook: DoD releases missing piece of 2015 budget; defense acquisition 'good enough'
The Defense Department's request for its overseas contingency operations is about $20 billion less than initial estimates. Former Defense officials say realistic goals and managed expectations usually spelled success for weapons systems.
The Science and Technology Directorate issued a Broad Agency Announcement and four specific solicitations to get industry, academia and others thinking about how to improve cybersecurity. Over the next nine months, the agency will review white papers, proposals and make awards, with expectations of the development of commercial or open source projects in the next year or two.
The Homeland Security Department will channel its efforts into battling terrorism, cyber threats and natural disasters, according to a quadrennial review the agency released Wednesday.
DISA is working with the services to identify a mission-critical application in the cloud to ensure the additional requirements for Level-3 security are appropriate and achievable. Meanwhile, the FedRAMP program office is beginning to consider what the program will look like in two to three to five years.
Michael Daniel, the Obama administration's cybersecurity coordinator, says he wants to dismantle the most common method of cyber protection: passwords. Even as cyber threats continue to grow more sophisticated and destructive, passwords are weakening and proving easier to crack than ever. The solution lies in the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls for a broad "identity ecosystem" to replace simple passwords.
Cybersecurity projects and programs are getting some hefty backing from the Senate.
Chairman Tom Wheeler said he wants to build on the initial success of the critical infrastructure cybersecurity framework released by the White House in February. He said it's not a matter of new regulations, but creating a joint approach to improving the network security across the entire communications sector. Rep. Mike Rogers (R-Mich.) renews hope for Congress to pass information sharing legislation this year.
The National Institute of Standards and Technology gives agencies guidance for continuing the transition to a real-time, dynamic cybersecurity.
A new survey by TechAmerica and Grant Thornton found many agency chief information officers continue to spend too much on legacy systems and don't have money to develop or modernize new software or applications. But tools such as PortfolioStat are making a difference in helping senior IT managers understand and have a say in where money is spent in their agency.
The comply-to-connect initiative is about removing much of the people challenges by automating the software patching and updating the cyber processes in real time.
Under a construct that's still under discussion, the Defense Information Systems Agency would take charge of some portion of DoD's cyber defenses under a new Joint Force Headquarters.
Government agencies are having a hard time recruiting, training and retaining cyber and IT professionals. That's partly due to a lack of flexibility in the hiring process, according to a group of federal cyber execs.
Rising stars in the cybersecurity field came together at the University of Massachusetts Boston recently to hone their skills.
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.
Agencies are getting smarter about cyber. The Homeland Security Department and General Services Administration are fine-tuning a contracting vehicle for tools that let agencies not only monitor their computer networks 24/7, but also fix things that go wrong. The umbrella term for the tools is continuous diagnostics and mitigation (CDM). Xceedium is a supplier of CDM software products. Ken Ammon, the chief strategy officer of Xceedium, told Federal Drive hosts Tom Temin and Emily Kopp what's in store for phase two of CDM.