bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
6:36 am, July 24, 2014

Search Result

Search Tags:  Cybersecurity

On DoD: NSA's Cyber Incident Response program

Chandra McMahon, Lockheed Martin's vice president for commercial markets, discusses NSA's accreditation system that tests cybersecurity companies against 21 separate focus areas.

Tags: Chandra McMahon , NSA , DoD , On DoD , Lockheed Martin , cybersecurity , industry , Jared Serbu

Wednesday - 06/18/2014, 02:48pm EDT
Listen

Jason Miller, Executive Editor, Federal News Radio

The Federal Communications Commission is challenging telecoms to work more closely with it to improve the nation's cybersecurity. FCC Chairman Tom Wheeler says he is not planning more regulations, rather he is asking the companies to share responsibility. Federal News Radio's Executive Editor Jason Miller joined Tom Temin and Emily Kopp on the Federal Drive to discuss the FCC's plans. Read Jason's related article.

Tags: Jason Miller , FCC , cybersecurity , Tom Temin , Emily Kopp , Federal Drive , In Depth

Friday - 06/13/2014, 10:45am EDT
Listen

Senate backs wide array of cyber projects in 2015 approps bill

Cybersecurity projects and programs are getting some hefty backing from the Senate.

Tags: cybersecurity , 2015 appropriations bill , Department of Commerce , DoJ , science , NIST , National Cybersecurity Center of Excellence , National Science Foundation

Monday - 06/16/2014, 09:14am EDT

FCC throws down cyber gauntlet to communications industry

Chairman Tom Wheeler said he wants to build on the initial success of the critical infrastructure cybersecurity framework released by the White House in February. He said it's not a matter of new regulations, but creating a joint approach to improving the network security across the entire communications sector. Rep. Mike Rogers (R-Mich.) renews hope for Congress to pass information sharing legislation this year.

Tags: technology , cybersecurity , AEI , Mike Rogers , Tom Wheeler , FCC , information sharing , Bob Dix , Jason Miller

Friday - 06/13/2014, 04:47am EDT
Listen

Jay Healey, Director of Cyber Statecraft Initiative, Atlantic Council

Congress is closer to cybersecurity legislation that tries to protect infrastructure from attacks. But Congress, and all the other organizations that make policy that affects the Internet, may be asking the wrong questions. Jay Healey, director of the Cyber Statecraft Initiative at the Atlantic Council, writes about the future of cybersecurity in National Interest Magazine. He explains on In Depth with Francis Rose what questions Congress should be asking.

Tags: Jay Healey , Atlantic Council , cybersecurity , In Depth

Friday - 06/13/2014, 04:17pm EDT
Listen

DoD reveals strategy to protect itself from hackers

The Department of Defense recognizes that it and American companies are prime targets for hackers, whether they be a nation-state or individuals. So it's put in place an operating strategy. That strategy is comprised of 5 elements: 1) a defensible architecture; 2) global situational awareness and a common operating picture; 3) a concept for operating in cyberspace; 4) trained and ready cyber forces; and 5) capacity to take action when authorized.

Tags: DoD , hackers , operating strategy , Cybersecurity Report , cybersecurity , JJ Green

Thursday - 06/05/2014, 08:51am EDT

Gordon Chang, Contributor, Forbes.com

The Pentagon says the Chinese military threat is growing because China steals intellectual property from the United States in giant quantities. DoD's new congressional report on China details violations of U.S. copyright and export laws by Chinese intelligence programs stealing national security technology. Gordon Chang, a contributor to Forbes.com, writes their New Asia column.

Tags: Gordon Chang , Forbes , China , In Depth , cybersecurity , DoD

Monday - 06/09/2014, 06:17pm EDT
Listen

U.S. improving cyber response plans

USCYBERCOM, according to testimony before Congress, is working on several elements to defend against cyber attacks. Those elements include tactics, techniques, and procedures, as well as policies and organizations. Officials say that also means turning plans into doctrine and training - and building a system that our Combatant Commanders can think, plan, and integrate cyber capabilities as they would capabilities in the air, land and sea domains. Cyber is different from all of them because it's mostly invisible.

Tags: USCYBERCOM , cyber attacks , Cybersecurity Report , cybersecurity

Thursday - 06/05/2014, 08:45am EDT

Too often, CIOs left wishing for funding for innovation, modernization

A new survey by TechAmerica and Grant Thornton found many agency chief information officers continue to spend too much on legacy systems and don't have money to develop or modernize new software or applications. But tools such as PortfolioStat are making a difference in helping senior IT managers understand and have a say in where money is spent in their agency.

Tags: technology , TechAmerica , Grant Thornton , George DelPrete , OMB , cloud computing , cybersecurity , shared services , Jason Miller

Friday - 06/06/2014, 03:55am EDT
Listen

NIST tells agencies how to get ready for continuous monitoring

The National Institute of Standards and Technology gives agencies guidance for continuing the transition to a real-time, dynamic cybersecurity.

Tags: technology , OMB , NIST , cybersecurity , continuous monitoring , Stephanie Wasko

Friday - 06/06/2014, 04:21am EDT
  •  
  • 4
  •