bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
12:37 pm, July 23, 2014

Search Result

Search Tags:  Cybersecurity

GSA's Office of Government-wide Policy focused on identity security, cybersecurity

GSA Office of Government-wide Policy Chief of Staff Stephanie Rivera discusses efforts to create a standardized operating process for all agencies, and the challenges and opportunities that go along with it.

Tags: Agency of the Month , GSA , Stephanie Rivera , technology , IT , cybersecurity , security , Office of Government-wide Policy , Jason Fornicola , best practices

Thursday - 05/22/2014, 02:02pm EDT

DARPA launches challenge to help create hacker-proof software

The Cyber Grand Challenge, set to launch for the first time two weeks from now, aims to encourage the development of computing systems that can seek out cybersecurity weaknesses better than humans can.

Tags: DoD , DARPA , cybersecurity , Cyber Grand Challenge , Michael Walker , Jared Serbu , technology

Thursday - 05/22/2014, 01:48pm EDT
Listen

DHS' push for clearer cyber authorities moves to the House

Larry Zelvin, the director of the National Cybersecurity and Communications Integration Center in DHS's National Protection and Programs Directorate, is expected to tell the House Homeland Security Committee Wednesday that the implementation of the advanced intrusion detection and prevention program known as Einstein is hampered by the lack of clarity of the exact role DHS is allowed to play under the current set of cybersecurity laws.

Tags: technology , DHS , Larry Zelvin , FBI , Joseph Demarest , cybersecurity , information sharing , Congress , House Homeland Security Committee , Heartbleed , Jason Miller

Wednesday - 05/21/2014, 06:10am EDT

How much damage has Chinese hacking done to the US government?

A government report indicates more than 40 Pentagon weapons programs and nearly 30 other defense technologies have been compromised by cyber intrusions from China. The cybersecurity firm Mandiant issued a report last year alleging links between a secret Chinese military unit and years of cyber-attacks against U.S. companies. Alcoa World Alumina, Westinghouse Electric Co., Allegheny Technologies, U.S. Steel Corp., the United Steelworkers Union and Solar-World are just six companies the Justice Department says were victims of Chinese hacking. U.S. officials suggest there are many more amounting to billions of dollars in economic losses.

Tags: China , cybersecurity , DoD , Mandiant , Alcoa World Alumina , Westinghouse Electric Co. , Allegheny Technologies , U.S. Steel Corp. , United Steelworkers , Solar-World , DoJ

Tuesday - 05/20/2014, 05:47pm EDT

All things contracting with IBM's Anne Altman

Anne Altman, general manager of Federal Government for IBM, will discuss a wide range of contracting topics with host Mark Amtower.
May 19, 2014

Tags: acquistion , contracting , IBM , Anne Altman , cloud computing , big data , Healthcare IT , cybersecurity , government IT , Small business contracting , Mark Amtower , Amtower Off Center

Monday - 05/19/2014, 09:48pm EDT
Listen

Richard Stiennon, cybersecurity analyst

Software assurance policies could be a foundation principle for cybersecurity at your agency in the next five years. That's a prediction from Richard Stiennon, the host of the Security Current blog, the founder of IT Harvest and the author of Surviving Cyberwar. Stiennon tells In Depth with Francis Rose he sees a cybersecurity culture shift inside the beltway.

Tags: Richard Stiennon , IT Harvest , cybersecurity , In Depth

Monday - 05/19/2014, 05:03pm EDT
Listen

Inside the Reporter's Notebook: GSA takes 18F on a magical mystery tour

In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.

Tags: Jason Miller , Inside the Reporters Notebook , Dan Tangherlini , Dave McClure , 18F , GSA , technology , cybersecurity , Matt Chessen , State , Roger Waldron , PTO , sequestration , Tony Scardino , HSPD-12 , DoD , Phyllis Schneck

Friday - 05/09/2014, 03:27pm EDT

Senate committee eyes new cyber hiring authorities for DHS

Sen. Tom Carper (D-Del.), chairman of the Homeland Security and Governmental Affairs Committee, said Thursday the committee plans to mark up a bill on May 21 to give DHS more tools to hire cyber workers more easily.

Tags: technology , cybersecurity , DHS , Tom Carper , Homeland Security and Governmental Affairs Committee , AFFIRM , workforce , training , FISMA , Jason Miller

Friday - 05/16/2014, 12:24pm EDT

Joe Petrillo, Procurement Attorney, Petrillo & Powell

The Pentagon has issued a final rule for dealing with counterfeit parts. Officials believe too many of them make their way into crucial electronic systems, threatening their reliability or compromising their security. The rule has been a long time coming. It affects both government buyers and industry suppliers. Joe Petrillo, a procurement attorney with the law firm Petrillo & Powell, spoke about some of the main aspects of the rule with Tom Temin and Emily Kopp on the Federal Drive.

Tags: Joe Petrillo , Petrillo and Powell , DoD , counterfeit parts , cybersecurity , technology , acquisition , Federal Drive

Thursday - 05/15/2014, 11:35am EDT
Listen

Ron Ross, Computer Scientist, NIST

The National Institute of Standards and Technology has launched a four-part plan to help agencies build more secure IT systems. NIST Computer Scientist Ron Ross, who guided a new publication on the issue, tells the Federal Drive with Tom Temin and Emily Kopp that the same engineering principles that apply to bridges and buildings should apply to IT. That is, security should be built in, not added later.

Tags: Ron Ross , NIST , Federal Drive , cybersecurity , information technology

Thursday - 05/15/2014, 02:16pm EDT
Listen
  •  
  • 6
  •