Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Amy Morris
The Federal Drive has the day off, but you can catch these great interviews from the past few weeks.
If you don't want employees in your agency to use a USB device, you can install an agent on the laptop that'll block any communication with a USB device. It is one example of a Data Leak Prevention tool, which can help you define the data you're trying to protect from threats within your own network. But that also means you have to know exactly what data it is that you WANT to protect. Khalid Kark of Forrester Research says if you don't know, you can't define it and the DLP tools can't work.
New tools can help you protect your network from the threat within. Khalid Kark of Forrester Research says there's a set of tools that are considered "network-centric," that will record all the network sessions. That allows cyber sleuths to replay the sessions and find out where any breaches or intrusions are coming from - in house. There are also "data leak prevention" tools you can use that'll allow you to create your own parameters that'll block that information from leaving your network.
The cyber threat landscape has changed dramatically in recent years. Experts believe that more threats than ever are not coming from other countries, or malicious hackers - but from within the network!The U.S. National Counterintelligence Strategy says that insiders are targeting networks to intercept information, or disrupt operations. Khalid Kark of Forrester Research says agencies have to manage people, the process, and technological controls. Continuous monitoring is the new buzzword.
DARPA is one agency that recognizes cyber threats are just as likely to come from within the network. The agency has posted a solicitation on Fed Biz Ops looking for what they call novel approaches to insider threat detection. The Defense Advanced Research Agency is looking for a way to increase the accuracy, rate and speed of detection. The Cyber Insider Threat (CINDER) program will stop adversaries from operating within government and military networks before they can get access.
It's being called a potential traffic catastrophe. Thousands of federal workers, and their cars, are being shifted to already crowded roads in Northern Virginia as part of BRAC. Now, there are efforts to stop it.
My weekly countdown of the three hottest stories of the week, as chosen by an expert Federal panel.
The sniper attacks from a journalist's point of view.
What doesn't kill you makes you stronger. Eventually.
What does it take to complete the Marine Corps Marathon? We get two answers from FederalNewsRadio anchors who managed to do it!