Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Cybersecurity
Documents obtained by Federal News Radio show VA's financial audit found material weaknesses, including the failure to remove terminated employees from accessing the network, and the lack of a formal process for monitoring, preventing installation and removing unauthorized application software on agency systems. House Veterans Affairs lawmakers continue to press VA to make changes to their cybersecurity posture more quickly. VA officials say they have a multi-layered defense to include outside network monitoring by external partners, active scanning of Web applications and source code, and protection of servers, workstations, network and gateways, among other security efforts.
Tags: technology , cybersecurity , Veterans Affairs , Stephen Warren , House Veterans Affairs Committee , Senate Veterans Affairs Committee , VA Cyber Efforts in the Hot Seat , veterans , information security , exclusive
Documents obtained by Federal News Radio show VA failed for the 15th year in a row its consolidated financial statement audit with regard to security controls.
You've heard of email and snail mail - but what about jail mail? It is something that will soon be on the way to some inmates at the Pasco County Jail in Florida. Sheriff Chris Nocco says 77 kiosks are being set up in the jail housing units. The set-ups will let inmates read and send email to those who have approved accounts. The sheriff says there will be no cost to taxpayers for the service. While inmates will be able to get email and photos, they will only be able to send email, not photos. And - as is the case with regular mail, deputies will be monitoring inmates email.
A longtime adviser to the U.S. Director of National Intelligence has resigned after the government learned he has worked since 2010 as a paid consultant for Huawei Technologies Ltd., the Chinese technology company the U.S. has condemned as an espionage threat. Theodore H. Moran, a professor at Georgetown University, had served since 2007 as adviser to the intelligence director's advisory panel on foreign investment in the United States. Moran also was an adviser to the National Intelligence Council, a group of 18 senior analysts and policy experts who provide U.S. spy agencies with judgments on important international issues.
More than a dozen industry technology and business groups are asking the House to adopt language in the Senate's Commerce, Justice, Science appropriations bill that would focus on risk when buying technology products and services from companies that have connections to China.
Bernie Mazer, the Interior Department's chief information officer, said among his top priorities are data center consolidation, cloud hosting, cybersecurity and strategic sourcing. He said the goal is to let the bureau level IT executives focus on mission and not worry about commodity IT.
Tags: Bernie Mazer , technology , Interior , cloud computing , management , data center consolidation , strategic sourcing , cybersecurity , Federal IT Acquisition Reform Act , Ask the CIO , Jason Miller
Federal News Radio Executive Editor Jason Miller joins host Mark Amtower to talk about a number of Federal IT issues.
December 9, 2013
Tags: acquistion , contracting , technology , federal IT , information technology , cloud computing , cybersecurity , IT acquisition , continuous monitoring , mobile technology , big data , data analytics , shared services , FITARA , Jason Miller , Federal News Radio , Ask the CIO , Mark Amtower , Amtower Off Center , BYOD
National Security Advisor Susan Rice has sent a strong message to the Chinese. During a speech at Georgetown University, she said, "Cyber-enabled economic espionage hurts China as well as the U.S., because American businesses are increasingly concerned about the costs of doing business in China." U.S. Intelligence officials have been sounding alarms about China's high tempo of economic espionage for more than a decade.
You've heard of Stuxnet --the destructive computer virus unleashed on Iran's nuclear facilities. It was believed to be the world's first cyber weapon. But now we're learning that it has a twin --and the twin actually came first and started eating away at Iran's nuclear facility at Natanz years before the more public version we learned about in 2010. The bad news for Iran's nuclear programmers is that it's not really clear how broad the Stuxnet family is.
The Homeland Security Department's Office of Inspector General took a look at DHS' information security program and practices and found them lacking.