Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Cybersecurity
Kelly Jackson Higgins wrote in her "Hacking The Adobe Breach" column, "At first glance, the massive breach at Adobe that was revealed last week doesn't neatly fit the profile of a pure cybercrime attack." She said not only did the bad guys steal customer data and payment info, but they also got ahold of the company's source code for Adobe's ColdFusion, Acrobat, and Reader software. Criminal investigators are looking into whether it was an accident or they deliberately went after the source code.
Rep. Dutch Ruppersberger (D-Md.), ranking member of the House Intelligence Committee said the longer we wait on cybersecurity legislation, the worse it gets for cyber attacks on the U.S.
While leaders at CMS said the hub connecting personal information stored in the health insurance marketplace to multiple agencies will be ready by the Oct. 1 deadline, legislators are concerned with how well CMS is securing individuals' personal information from cyber threats.
Congress approves a $175 million spending package that will let the Army move ahead with plans to consolidate 400 IT security watchtowers down to around a dozen. The cyber initiative is part of broader effort to move the entire DoD toward the Joint Information Environment.
The "persistent threat" is becoming the hallmark of how government and industry deal with cybersecurity concerns, particularly threats to the nation's electrical grid and critical infrastructure. Plus: how is industry and government training and retaining top cybersecurity professionals? On this edition of "AFCEA Answers", we'll explore these topics with Dr. Ernest McDuffie from NIST; Mike Peterson, Vice President with URS, former Air Force CIO; and Tom Conway, Director of Federal Business Development with McAfee.
Anne Neuberger, director of the National Security Agency's Commercial Solutions Center, explains the pluses and minuses of public-private partnerships for the cybersecurity world.
The preliminary version of the framework will be published in mid-October, followed by several months of public comment. NIST plans a final release of the voluntary framework in February.
Recent revelations about secret U.S. surveillance programs could significantly impede progress on negotiations over new laws and regulations meant to beef up the country's defenses against the growing threat of cyber-attacks. Current and former cyber security officials say they worry the ongoing disclosures about secret National Security Agency spying programs by former NSA contractor Edward Snowden could trigger knee-jerk reactions by Congress or the private sector.
How does DHS detect and respond to malicious cyber activity. DHS also operates a cyber-information coordination center, the National Cybersecurity and Communications Integration Center (NCCIC), and several operational units. These units respond to incidents and provide technical assistance to information system operators. The NCCIC coordinates the information collected through these channels to create a common operating picture for cyber communities across all levels of government and the private sector.
How do you know if your computer is vulnerable to cyber-attack? USCERT The U.S. Computer Emergency Readiness Team. says many computers are sold with software already loaded. Whether installed by a computer manufacturer, operating system maker, Internet Service Provider, or by a retail store, USCERT says the first step in assessing the vulnerability of your computer is to find out what software is installed and how one program will interact with another. Unfortunately, it is not practical for most people to perform this level of analysis.