Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Cybersecurity
The Army still doesn't know whether its new and growing force of soldiers dedicated to cyber missions is large enough for the task. But it's certain it doesn't have the legal authorities it needs to attract and retain the talent it wants.
NIST issues the industry-developed final draft approach to help critical infrastructure providers secure their computer systems. The agency is accepting comments over the next couple of months and will issue a version 1.0 of the framework in February. Industry offered mixed reactions to the framework. Some said it's too broad while others said it provides a set of agreed upon basic cyber protections.
Tags: technology , cybersecurity , NIST , Patrick Gallagher , critical infrastructure , Bob Dix , Tim Conway , McAfee , Telecommunications Industry Association , White House , Phil Agcaoili , Cox Communications , Jason Miller
Inside the Reporter's Notebook: OMB adds clarity to new cyber policy; Cyber risks during shutdown overstated; OASIS delayed indefinitely
The White House is finalizing its first major cybersecurity policy in more than three years.
Tags: technology , cybersecurity , government shutdown , OMB , Sylvia Burwell , continuous monitoring , GSA , OASIS , contracting , James Clapper , ODNI , Keith Alexander , DoD , security clearances , Greg Elin , FCC , James Cochrane , USPS , Ellis Burgoyne , chief data officer , Inside the Reporters Notebook , Jason Miller
The Homeland Security Department has received a mixed report from the inspector general on coordinating cyber operations across government, along with seven recommendations for improvement.
Adobe Systems Inc. says that the scope of a cyber-security breach disclosed nearly a month ago was much worse than initially reported. They now say attackers obtained data on more than 38 million customer accounts. The software maker also said that hackers had stolen part of the source code to Photoshop editing software that is widely used by professional photographers.
Singapore's government is on heightened alert for cyber-attacks after threats from claiming to be from international hacking collective Anonymous defaced several web sites in the city-state and threatened further action. "Government agencies have been on heightened vigilance and have enhanced the security of their IT systems in response to the declared threats against the government's ICT infrastructure," the Infocommunications Development Authority of Singapore (IDA) said in a statement.
Army Research Lab is partnering with universities and scientists to explore the psychology behind cybersecurity.
With the partial government shutdown behind them, members of Congress are working on several bills that impact the federal workforce, including a resolution that supports ending the federal pay freeze and a bill that tackles the claims backlog at Veterans Affairs.
Israel's military chief Lt. Gen. Benny Gantz says computer sabotage is a major concern and he warned a sophisticated cyber-attack could one day bring the nation to a standstill. In fact, a month before his address, a major artery in Israel's national road network in the northern city of Haifa was shut down because of a cyber-attack by a Trojan horse. Key operations were knocked out of commission for two days causing hundreds of thousands of dollars in damage.