bnv.fnr.news/microsite;microsite=gditmain;tile=1;pos=top;sz=728x90,970x90;ord=
bnv.fnr.news/microsites;microsite=gditcyber;tile=1;pos=top;sz=728x90,970x90;ord=
4:55 am, October 2, 2014

General Dynamics IT Solutions Center - Cyber

Section

« Back to the story

In an effort to provide a better environment for commenting, we have changed our comment platform. In order to comment on a story, you will first need to create a Disqus account if you do not already have one. It's easy! Sign up for an account below by clicking in the "Leave a message" field and then clicking on the blue Disqus icon. Alternatively, you can now comment using your Facebook, Twitter or Google accounts.

Federal News Radio understands how important anonymity is to some commenters. Like our previous platform, our new system allows users to identify their comments with a screen name (instead of their first and last name) if they so choose. Find more information about creating a screen name and other frequently asked questions about Disqus here.

Our comment policy itself has not changed. Federal News Radio encourages users to express their opinions by posting comments that have a positive and constructive tone; are on topic, clear and to-the-point; and are respectful towards others and their opinions. Our goal is to maintain a civil dialogue in which readers feel comfortable. Federal News Radio reserves the right to remove comments and block users that do not follow these criteria.

comments powered by Disqus

Government hackers try to crack HealthCare.gov

Report: Government's own 'white-hat' hackers give HealthCare.gov mixed review on security

Thursday - 09/25/2014, 03:42am EDT

Improved online and mobile security the focus of federal grants

Three million dollars in federal grants will go to four national mobile communications companies to figure out a way to get rid of passwords. The grants come from the Commerce Department's National Strategy for Trusted Identities in Cyberspace program, or NSTIC. The goal of NSTIC is to give consumers better security options with their mobile and online transactions. Commerce hopes that funding research to get rid of passwords will eventually minimize the risk of identity theft.

Friday - 09/19/2014, 05:23pm EDT

CMS sets new deadline to fix two dozen HealthCare.gov cyber shortfalls

Marilyn Tavenner, the Centers for Medicare and Medicaid Services administrator, promised House lawmakers Thursday that the site would be better protected when open enrollment begins in two months. The recent attack on the HealthCare.gov didn't succeed in stealing any data, DHS says. But some lawmakers say a year into the Affordable Care Act, the website still has basic cybersecurity challenges that should have been fixed.

Friday - 09/19/2014, 04:17am EDT

Senate: China hacked military contractor networks

Senate investigation says China hacked into military contractor networks at least 9 times

Thursday - 09/18/2014, 05:50pm EDT

Army to recruit next generation of cyber workers through new career field

Ronald Pontius, the deputy to the commander of Army Cyber Command, said over the next few years the Army will give cyber workers their own career field, preliminarily known as Career Field 17.

Thursday - 09/18/2014, 10:38am EDT
Listen

Army, Air Force reach first milestone in shared cybersecurity system

The Army and Air Force are using a shared network security infrastructure at Joint Base San Antonio as of Sept. 14. It's a major step toward the Defense Department's goal of moving base-level cybersecurity operations to a more defensible, centrally-managed architecture.

Thursday - 09/18/2014, 05:01am EDT
Listen

Army stands up first-of-its-kind cyber brigade, explores dedicated career field for cyber

The Army's new dedicated career branch for cyber specialties could be up and running as soon as October.

Friday - 09/12/2014, 05:50pm EDT

Army aims to introduce new technology to soldiers

The Army has a request for information out to see how it can introduce 4G LTE mobile technology to soldiers on the battlefield. The Army wants to see how 4G can help with battlefield intelligence and communication, and keep those capabilities on a wireless network. It hopes the technology can be tailored to help individual soldiers interact and contribute to the battlefield network. The Army wants the network to support video, voice and text communications. Responses to the ROI are due on October 6th.

Thursday - 09/11/2014, 03:50pm EDT

Confusion rises over the CDM dashboard

Despite news to the contrary, the Homeland Security Department has not picked a vendor to provide the CDM dashboard. This post is part of Jason Miller's Inside the Reporter's Notebook feature.

Monday - 09/08/2014, 04:16am EDT

Hackers break into HealthCare.gov

Hackers break into HealthCare.gov but officials say no consumer data compromised

Thursday - 09/04/2014, 11:40pm EDT

National Guard carves out its slice of DoD cyber mission, wants teams in every state

Both the Army and Air National Guard say they are making inroads toward gaining a foothold for their state-based forces in the Defense Department's growing mission sets in cyberspace. Both services say they are training more personnel and building the guard's credibility within the Pentagon when it comes to cyber missions.

Wednesday - 09/03/2014, 04:32am EDT
Listen

Dave McClure lands at cloud, cyber company as chief strategist

Former GSA official Dave McClure left government in June and now is an executive at the Veris Group.

Tuesday - 09/02/2014, 11:30am EDT
Listen

Tom Karygiannis, National Institute of Standards and Technology

It seems like the whole world is going mobile, and that includes the federal government. Agencies are using more and more apps for collaboration and productivity. But some apps increase the potential for exposing government data. To help you guard against these security risks, the National Institute of Standards and Technology is providing tips to the federal community for vetting third-party apps. Computer Scientist, Tom Karygiannis, joined Tom Temin on the Federal Drive to discuss the guidelines.

Thursday - 08/28/2014, 10:06am EDT
Listen

Tips on how to manage your network

Chris LaPoint, vice president of Product Management for SolarWinds will discuss how his company can help your agency manage its information technology system.
August 26, 2014

Tuesday - 08/26/2014, 09:47pm EDT
Listen

DISA to restructure with eye toward more agility, Cyber Command

The Defense Information Systems Agency will begin to shake up its organizational chart in significant ways beginning on Oct. 1. But officials, so far, are reluctant to discuss the details.

Monday - 08/25/2014, 04:24am EDT
Listen

25,000 DHS employees at greater risk of identity theft after hack

New details emerge about the cyber attack against USIS. Hackers accessed personal information of Department of Homeland Security workers, including Social Security numbers, dates of birth and addresses. DHS will offer credit monitoring services to the affected employees.

Monday - 08/25/2014, 04:08am EDT

Official says hackers hit up to 25,000 fed workers

Official says breach at security clearance contractor affects up to 25,000 federal workers

Saturday - 08/23/2014, 10:10am EDT

US won't reveal records on health website security

Citing threats from hackers, US won't release security details for federal health care website

Thursday - 08/21/2014, 11:08am EDT

DoD revisiting security guidelines for commercial cloud

The Defense Information Systems Agency, which serves as the broker between Defense Department components and commercial providers of cloud computing services, says the certification standards it set for commercial providers may be too arduous for vendors. DoD also launched five pilots to test the use of commercial cloud providers and is reassessing how it develops cloud requirements.

Thursday - 08/21/2014, 05:19am EDT
Listen

NSA's mobility mission office puts itself out of business

The National Security Agency closed down an office dedicated to mobility, because devices and apps have become part of the fabric of everything the agency does. But NSA, like all agencies, still must figure out how to secure mobile devices using derived credentials.

Thursday - 08/21/2014, 04:53am EDT
Listen
  • 1
  •