Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Cybersecurity
Data breaches happen in both the private and public sector. The latest victims include the IRS, Veteran Affairs and Target. So, whom do you call when your agency is under attack? The Secret Service might not initially come to mind, but it has a long history of protecting the nation's financial infrastructure from threats. Bill Noonan, the deputy special agent in charge of cyber operations for the Secret Service, recently testified before the Senate Judiciary Committee about the agency's experience in the cyber arena. He joined Federal Drive hosts Tom Temin and Emily Kopp to further discuss the agency's role in cyber.
California Attorney General Kamala Harris says her state has become a major U.S. target of cyber-crimes committed by outlaw groups with ties to Eastern Europe, China and Africa. As part of a broader report on international organized crime groups, Harris said about 17 percent of attempts to hack into major computer networks in the United States in 2012 were aimed at California.
Microsoft, is admitting it searched emails in a blogger's Hotmail account to track down who was leaking company secrets. John Frank, deputy general counsel for Microsoft, which owns Hotmail, said in a statement the software company ``took extraordinary actions in this case.'' But, In the future, he said, Microsoft would consult an outside attorney who is a former judge to determine if a court order would have allowed such a search.
GSA awarded a $47.3 million contract to Metrica Team Venture to provide software and services under the continuous diagnostics and mitigation program. DHS expects the dashboard to offer a more insightful view of the cyber health of agency networks starting this fall.
Tags: technology , cybersecurity , DHS , GSA , Jeff Eisensmith , Energy Department , Bob Brese , Jim Piche , Continuous monitoring , Metrica Team Venture , industry , contracting , FedInsider , ImmixGroup , Jason Miller
Technology has made it a lot easier for small businesses to function over the past few years. But with that ease comes many cybersecurity concerns.
Gen. Keith Alexander, who will soon retire as the first commander of U.S. Cyber Command, said his organization has matured to the point that it should join the club of unified commands that report directly to the President.
Rob Anderson, the chief of the Vision and Strategy Division in the Marine Corps Command, Control, Communication and Computers (C4) office, said reducing the monthly data and voice fees for even 50 percent of the current employees using BlackBerrys could mean as much as $5 million that the Marines could transfer to readiness and operations and maintenance accounts.
March 13, 2014
A higher slot on the military's organizational chart for U.S. Cyber Command.
There's some new spyware that's been infecting hundreds of government computers in Europe and the United States. Several security researchers and Western intelligence officers, according to Reuters believe the malware, called Turla, is from the Russian government. They also think it's inked to the same software used in a U.S. military breach in 2008.
In this week's edition of Inside the Reporter's Notebook: Another senior technology official at DHS is on the move; HUD quietly extended the HITS contracts to Lockheed Martin and HP Enterprise Services; Defense CIO Teri Takai doesn't have a lot of good things to say about the Federal Information Technology Acquisition Reform Act and a new DHS office will raise the level of focus on critical infrastructure security.