Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Cybersecurity
The troubled HealthCare.gov website has been the subject of at least one attempted but unsuccessful cyber attack, according to one of the of the Homeland Security Department's top cyber officials. Lawmakers at a House Homeland Security Committee hearing said the consolidation of personal information and the glitch-prone website are cause for concern.
In this week's edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz in the acquisition and IT communities that you may have missed.
Tags: technology , Digital Government Strategy , Gwynne Kostin , GSA , web analytics , USDA , Amanda Nguyen , HealthCare.gov , House Oversight and Government Reform Committee , Karen Evans , Todd Park , Steven VanRoekel , CMS , OMB , Trey Gowdy , Frank Baitman , Henry Chao , cybersecurity , DATA Act , Federal IT Acquisition Reform Act , Congressional Budget Office , DHS , contracting , Mary Davie , Anne Rung , Inside the Reporters Notebook , Jason Miller
Google is warning U.S. lawmakers that U.S. spying operations risk fracturing the open Internet into a "splinter net" that could hurt American business. In the first public testimony before Congress by a major technology company since former National Security Agency contractor Edward Snowden disclosed top secret surveillance programs, Google said it should be allowed to provide the public more information about government demands for user data.
A self-described "hacktivist" will spend 10 years in prison for illegally accessing computer systems of law enforcement agencies and government contractors. Before hearing his sentence, an unrepentant Jeremy Hammond told a federal judge that his goal was to expose injustices by the private intelligence industry when he joined forces with Anonymous. "Yes I broke the law, but I believe sometimes laws must be broken in order to make room for change," he said. The Chicago computer whiz and college dropout insisted his hacking days are over but added, "I still believe in hacktivism as a form of civil disobedience."
The Office of Management and Budget released a new memo Tuesday detailing the steps and deadlines agencies must meet to implement information-system continuous monitoring. The mandate comes on the heels of the General Services Administration and the Homeland Security Department releasing the first task order for continuous diagnostics and mitigation (CDM) tools and sensors, of which Federal News Radio has exclusive details.
The chief information and chief technology offices at the Commerce Department have generated more than $200 million in savings by taking a collaborative approach to purchasing IT and cybersecurity products.
Collaboration is the name of the game when it comes to many of the Homeland Security Department's cybersecurity efforts. Doug Maughan, director of DHS' Cybersecurity Division in the department's Science and Technology Directorate, discussed the department's cyber partnerships as part of the Federal News Radio special report, A New Era in Technology.
A pilot project is part of NSA's push to layer commercial technologies and standards on top of one another to achieve security goals more quickly. This approach would replace the government-specific IT solutions that can take years and millions of dollars to develop.
Every day it seems there's a new Cyber Security threat. Everything from ransom ware to zero day issues. Cyber security insurance has been the way that companies have tried to offset the risk of online attacks and data loss, but the insurers were missing the information they needed to convince potential clients to buy their products. But now threat intelligence is helping them gauge the risk that potential customers might encounter.