Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Alan Paller
Federal cybersecurity officials are in knots over the Heartbleed threat. The vulnerability potentially affects a common data encryption system used on internet servers. Homeland Security says federal web servers are OK. Qualys has a free online SSL Server Test that can analyze a web server. Alan Paller, director of research at the cybersecurity education firm SANS Institute, explained the threat to Federal Drive hosts Tom Temin and Emily Kopp.
Alan Paller of the SANS Institute and Jenny Mattingley of Shaw Bransford & Roth counted down the top federal stories of the week with Francis Rose.
The goal is to more accurately evaluate the security of the government's computer networks and systems. These efforts could bring more consistency to the cyber auditing process and engender more confidence in its results.
Tags: technology , cybersecurity , oversight , Kathleen Tighe , Education Department , Ron Ross , NIST , SANS Institute , council of the inspectors general on integrity and and efficiency , Jason Miller
The inconsistent way inspectors general review the security of federal networks and computers is causing uncertainty around what is working and what isn't in the federal government. A recent State Department IG management alert is a prime example of this growing disconnect.
On the In Depth show blog, you can listen to our interviews, find more information about the guests on the show each day, as well as links to other stories and resources we discuss.
Ron Sanders, vice president at Booz Allen, and Alan Paller, founder of the SANS Institute, count down the week's top federal stories with Francis Rose.
Nina Olson of the IRS talks about new penalties aimed at reducing tax-return related identity theft. Alan Paller of the SANS Institute offers insight on the increased cyber funding in President Obama's 2014 budget request. Dwight Sullivan, a civilian counsel with the Air Force Appellate Defense Division, discusses Defense Secretary Chuck Hagel's call to remove commanders' ability to overturn criminal convictions. Sandy Baum of George Washington University discusses a new study that calls on changes to the Pell Grant program. Erika Harrell of the Bureau of Justice Statistics talks about a new report on violence in the workplace. Cady North, a senior financial analyst with Bloomberg Government, talks about a new report on funding among six financial regulatory agencies.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
The newly issued Executive Order gives NIST, DHS several goals and corresponding deadlines over the next year. NIST will work with industry to create a cybersecurity framework. DHS is expanding the information sharing program so industry can receive classified and unclassified cyber threat data more easily and more quickly.
Tags: technology , NIST , Patrick Gallagher , DHS , Bruce McConnell , Jane Holl Lute , Michael Daniel , White House , cybersecurity , information sharing , Verizon , U.S. Chamber of Commerce , SANS Institute , Craig Silliman , Jason Miller
The Defense Department plans to boost the ranks of cybersecurity professionals, increasing cyber staff at U.S. Cyber Command by more than five times to some 4,900 employees. But DoD's plan is daunting in more ways than one. The job qualifications and skills needed for the kinds of positions the Pentagon wants are rare and often require years of training and hands-on experience. And even if DoD looks outside the confines of the Pentagon to fill these roles, it's not entirely clear where the new cyber pros would come from.