bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
10:20 pm, November 21, 2014

Search Result

Search Tags:  Cybersecurity

As cyber attackers get more sophisticated, so must agencies' protections

Cyber criminals are adjusting so quickly that it's become an 'arms race' between them and agency technology officers trying to guard against threats. During a recent Federal News Radio panel discussion, officials shared expertise and tactics for protection.

Tags: Bob Bigman , Darren Van Booven , Ben Rubin , Lance Dubsky , Tony Cole , cybersecurity , hackers , IT , Dena Levitz , technology

Friday - 07/18/2014, 02:29pm EDT

Levi Gundert, Technical Lead, Cisco

The Justice Department is asking Congress for more resources to fight cybercrime. Yesterday, a top official told Senators cyber criminals are becoming so sophisticated that the department, and the FBI in particular, are adapting their tactics and tools on a minute-by-minute basis. That might not be fast enough. The FBI estimates 500 million computers are infected by botnets each year, meaning that there are 18 victims per second. Levi Gundert is a former secret service agent and now a technical lead with Cisco's Threat Research, Analysis and Communications team. He told Emily Kopp on the Federal Drive that the government deserves credit for building partnerships that can track and find cyber criminals.

Tags: Levi Gundert , cybersecurity , Federal Drive , Emily Kopp , cisco

Wednesday - 07/16/2014, 08:57am EDT
Listen

All things contracting with IBM's Anne Altman

Anne Altman, general manager of Federal Government for IBM, will discuss a wide range of contracting topics with host Mark Amtower.
July 14, 2014

Tags: acquisition , contracting , IBM , Anne Altman , cloud computing , big data , Healthcare IT , cybersecurity , government IT , Small business contracting , Mark Amtower , Amtower Off Center

Monday - 07/14/2014, 09:48pm EDT
Listen

Agencies reset after missing the mark on cybersecurity goals

Despite steps forward, agencies fell short of their 2014 targets for cybersecurity. The Obama administration is pushing chief information officers to focus on priorities of continuous monitoring, phishing and malware, and authorization processes for 2015, according to the newly released cross-agency priority goals on Performance.gov.

Tags: technology , cross-agency priority goals , Performance.gov , DHS , DoD , cybersecurity , continuous monitoring , Stephanie Wasko

Monday - 07/14/2014, 02:52pm EDT

Federal cybersecurity update

Julie Perkins hosts a roundtable discussion of the latest developments in cybersecurity.
July 11, 2014

Tags: workforce , cybersecurity , cybersecurity framework , Cybersecurity executive order , Julie Perkins , Gregory Wilshusen , GAO , Ari Schwartz , John Lainhart , IBM Global Business Services , Alma Cole , The Performance Institute , Fed Talk , Shaw Bransford and Roth

Friday - 07/11/2014, 05:18pm EDT
Listen

Report: Chinese hackers hit OPM networks

Chinese hackers broke into OPM computer networks earlier this year with the intention of accessing the files of tens of thousands of federal employees who had applied for top-secret security clearances, according to a media report. OPM tells Federal News Radio, "neither OPM nor US-CERT have identified any loss of personally identifiable information."

Tags: OPM , hackers , Chinese , DHS , US CERT , cybersecurity , technology

Thursday - 07/10/2014, 01:31pm EDT

Mark Cohn, Chief Technology Officer, Unisys Federal Systems

When it comes to critical infrastructure cybersecurity, White House policy has federal agencies and the private sector joined at the hip. So it matters to the federal government how good the private sector is at cyber. Unisys and the Poneman Institute surveyed companies who operate critical infrastructure. The picture isn't great. Mark Cohn, the chief technology officer of Unisys Federal Systems, joined Tom Temin and Emily Kopp on the Federal Drive to discuss the results of the survey.

Tags: Mark Cohn , Unisys Federal Systems , cybersecurity , Federal Drive , Tom Temin , Emily Kopp

Thursday - 07/10/2014, 06:48am EDT
Listen

Mari Galloway, Women's Society of Cyber Jutsu

It's no secret the U.S. faces some big challenges with the size and capacity of its cybersecurity workforce. But putting a finer point on those challenges isn't as easy. An all-week event at Virginia Tech tried to answer those questions. At the 2014 U.S Cyber Challenge Summer Cyber Camp, attendees got intensive training on discrete cyber skills but also an overview of the overall workforce shortage, and where their specialized skills might be able to help. Mari Galloway, director of finance for the Women's Society of Cyber Jutsu, was one of the 45 participants in this week's event. She tells In Depth with Francis Rose about a few of her main takeaways.

Tags: cybersecurity , Womens Society of Cyber Jutsu , technology , In Depth , Mari Galloway

Friday - 06/20/2014, 04:29pm EDT
Listen

Jane Holl Lute, President and CEO, Council on Cybersecurity

The Senate would like to grant new powers to federal chief information officers and update federal IT laws that haven't gotten much attention for the past dozen years. Those are a couple of the effects of new legislation the Senate Homeland Security and Governmental Affairs approved recently. One of the bills is the Senate version of the Federal IT Acquisition Reform Act -- the other is an update to the Federal Information Security Modernization Act, which Senators have been trying to modify for the past several years, without much success. She said on In Depth with Francis Rose the proposals are a big step in the right direction.

Tags: Council on Cybersecurity , Federal IT Acquisition Reform Act , Jane Holl Lute , cybersecurity , Federal Information Security Modernization Act , FISMA

Monday - 07/07/2014, 04:06pm EDT
Listen
  •  
  • 10
  •