bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
4:15 am, August 1, 2014

Search Result

Search Tags:  Cybersecurity

DoD reveals strategy to protect itself from hackers

The Department of Defense recognizes that it and American companies are prime targets for hackers, whether they be a nation-state or individuals. So it's put in place an operating strategy. That strategy is comprised of 5 elements: 1) a defensible architecture; 2) global situational awareness and a common operating picture; 3) a concept for operating in cyberspace; 4) trained and ready cyber forces; and 5) capacity to take action when authorized.

Tags: DoD , hackers , operating strategy , Cybersecurity Report , cybersecurity , JJ Green

Thursday - 06/05/2014, 08:51am EDT

Gordon Chang, Contributor, Forbes.com

The Pentagon says the Chinese military threat is growing because China steals intellectual property from the United States in giant quantities. DoD's new congressional report on China details violations of U.S. copyright and export laws by Chinese intelligence programs stealing national security technology. Gordon Chang, a contributor to Forbes.com, writes their New Asia column.

Tags: Gordon Chang , Forbes , China , In Depth , cybersecurity , DoD

Monday - 06/09/2014, 06:17pm EDT
Listen

U.S. improving cyber response plans

USCYBERCOM, according to testimony before Congress, is working on several elements to defend against cyber attacks. Those elements include tactics, techniques, and procedures, as well as policies and organizations. Officials say that also means turning plans into doctrine and training - and building a system that our Combatant Commanders can think, plan, and integrate cyber capabilities as they would capabilities in the air, land and sea domains. Cyber is different from all of them because it's mostly invisible.

Tags: USCYBERCOM , cyber attacks , Cybersecurity Report , cybersecurity

Thursday - 06/05/2014, 08:45am EDT

Too often, CIOs left wishing for funding for innovation, modernization

A new survey by TechAmerica and Grant Thornton found many agency chief information officers continue to spend too much on legacy systems and don't have money to develop or modernize new software or applications. But tools such as PortfolioStat are making a difference in helping senior IT managers understand and have a say in where money is spent in their agency.

Tags: technology , TechAmerica , Grant Thornton , George DelPrete , OMB , cloud computing , cybersecurity , shared services , Jason Miller

Friday - 06/06/2014, 03:55am EDT
Listen

NIST tells agencies how to get ready for continuous monitoring

The National Institute of Standards and Technology gives agencies guidance for continuing the transition to a real-time, dynamic cybersecurity.

Tags: technology , OMB , NIST , cybersecurity , continuous monitoring , Stephanie Wasko

Friday - 06/06/2014, 04:21am EDT

Marines driving toward more active approach to cyber

The comply-to-connect initiative is about removing much of the people challenges by automating the software patching and updating the cyber processes in real time.

Tags: technology , cybersecurity , Ray Letteer , DoD , Marine Corps , AFCEA , continuous monitoring , Jason Miller

Friday - 05/30/2014, 01:35pm EDT
Listen

Maj. Gen. Dale Meyerrose, Air Force (Ret.), Meyerrose Group

A computer hacker facing up to 20 years in prison is free after helping the federal government stop hundreds of cyberattacks. He taught agencies how to protect millions of dollars and cripple the hacker group Anonymous. Retired Air Force Maj. Gen. Dale Meyerrose was chief information officer for three Air Force commands and three joint combatant commands. He was also the first CIO of the Office of the Director of National Intelligence and is now president of the Meyerrose Group. He joined In Depth with Francis Rose to explain what kind of precedence this sets for future cybersecurity policies.

Tags: Dale Meyerrose , Air Force , cybersecurity , hacking , Meyerrose Group , DoD , In Depth

Monday - 06/02/2014, 05:24pm EDT
Listen

Jason Miller, Executive Editor, Federal News Radio

Rob Carey spent 31 years in federal technology, but his "wow" moment came toward the end of his tenure. Carey recently retired from the Defense Department, becoming at least the ninth senior technology official to leave government since November. Carey is the former principal deputy CIO at the Defense Department and now is the vice president and general manager for cybersecurity at CSC. He tells executive editor Jason Miller on Ask the CIO about the moment when he knew technology had changed government. Listen to the full show.

Tags: Jason Miller , Ask the CIO , Rob Carey , cybersecurity

Monday - 06/02/2014, 10:29am EDT
Listen

IG concludes VA's systems, data remain at risk

The 2013 FISMA report to Congress shows the Veterans Affairs Department continues to struggle with cybersecurity and has more than 6,000 items on its plans of actions and milestones and continued weaknesses in access and configuration management controls. VA CIO Stephen Warren details several initiatives to address many of the 35 recommendations.

Tags: technology , cybersecurity , Veterans Affairs , oversight , FISMA , Congress , Stephen Warren , VA Cyber Efforts in the Hot Seat , Jason Miller

Friday - 05/30/2014, 04:11am EDT

U.S. Cyber Command wants DISA to take greater role in DoD cyber defense

Under a construct that's still under discussion, the Defense Information Systems Agency would take charge of some portion of DoD's cyber defenses under a new Joint Force Headquarters.

Tags: DoD , DISA , U.S. Cyber Command , Michael Rogers , Edward Cardon , AFCEA , workforce , cybersecurity , management , Jared Serbu

Thursday - 05/29/2014, 03:46am EDT
Listen
  •  
  • 5
  •