bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
4:22 am, September 2, 2014

Search Result

Search Tags:  Cybersecurity

White House cyber czar's goal: 'Kill the password dead'

Michael Daniel, the Obama administration's cybersecurity coordinator, says he wants to dismantle the most common method of cyber protection: passwords. Even as cyber threats continue to grow more sophisticated and destructive, passwords are weakening and proving easier to crack than ever. The solution lies in the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls for a broad "identity ecosystem" to replace simple passwords.

Tags: cybersecurity , Michael Daniel , IESG , NSTIC , identity management , Jack Moore

Wednesday - 06/18/2014, 12:06pm EDT

DoD to test cloud security requirements above, beyond FedRAMP

DISA is working with the services to identify a mission-critical application in the cloud to ensure the additional requirements for Level-3 security are appropriate and achievable. Meanwhile, the FedRAMP program office is beginning to consider what the program will look like in two to three to five years.

Tags: technology , cybersecurity , cloud computing , Maria Roat , GSA , DoD , Kevin Dulany , AFCEA , FedRAMP , Jason Miller

Thursday - 06/19/2014, 04:01am EDT
Listen

DoD's own testing of cloud security standards

The Defense Department's testing its own version of cybersecurity standards for cloud systems. The Defense Information Systems Agency is working with all the military branches to find a cybersecurity program that protects the cloud with Level-3 security requirements. DISA's enterprise cloud broker is conducting the software tests. DoD's chief of the risk management oversight division in the chief information officer's office,Kevin Delaney, isn't sure when the tests will be over. He says the development needs to run incrementally so each level of security controls are working right. The tests are coinciding with the deadline for agency cloud systems to earn security certification through the Federal Risk and Authorization Management Program. Right now FedRAMP offers cloud certification for low to moderate security levels.

Tags: DoD , GDIT , cloud , cybersecurity , GDIT Enterprise Center

Thursday - 06/19/2014, 10:31am EDT

Building On A Solid Cybersecurity Framework

With stories of cyberattacks making the news almost daily, it has become more important than ever to protect the critical infrastructure supporting private industry. That's the goal behind a cybersecurity framework mandated by President Obama, developed by the National Institutes of Standards and Technology (NIST), and now being implemented by the Department of Homeland Security (DHS). In this edition of "AFCEA Answers," we'll get insights into the progress on the framework from Bobbie Stempfley, Deputy Assistant Secretary for Cybersecurity Strategy and Emergency Communications with DHS's National Protections and Programs Directorate. Stempfley will outline the importance of the voluntary nature of the framework, explain the need for highly trained cybersecurity professionals, and discuss how DHS works with other federal agencies and key public and private stakeholders.

Tags: AFCEA , AFCEA Answers , Max Cacas , Bobbie Stempfley , cybersecurity , DHS

Wednesday - 06/18/2014, 02:15pm EDT

On DoD: NSA's Cyber Incident Response program

Chandra McMahon, Lockheed Martin's vice president for commercial markets, discusses NSA's accreditation system that tests cybersecurity companies against 21 separate focus areas.

Tags: Chandra McMahon , NSA , DoD , On DoD , Lockheed Martin , cybersecurity , industry , Jared Serbu

Wednesday - 06/18/2014, 02:48pm EDT
Listen

Jason Miller, Executive Editor, Federal News Radio

The Federal Communications Commission is challenging telecoms to work more closely with it to improve the nation's cybersecurity. FCC Chairman Tom Wheeler says he is not planning more regulations, rather he is asking the companies to share responsibility. Federal News Radio's Executive Editor Jason Miller joined Tom Temin and Emily Kopp on the Federal Drive to discuss the FCC's plans. Read Jason's related article.

Tags: Jason Miller , FCC , cybersecurity , Tom Temin , Emily Kopp , Federal Drive , In Depth

Friday - 06/13/2014, 10:45am EDT
Listen

Senate backs wide array of cyber projects in 2015 approps bill

Cybersecurity projects and programs are getting some hefty backing from the Senate.

Tags: cybersecurity , 2015 appropriations bill , Department of Commerce , DoJ , science , NIST , National Cybersecurity Center of Excellence , National Science Foundation

Monday - 06/16/2014, 09:14am EDT

FCC throws down cyber gauntlet to communications industry

Chairman Tom Wheeler said he wants to build on the initial success of the critical infrastructure cybersecurity framework released by the White House in February. He said it's not a matter of new regulations, but creating a joint approach to improving the network security across the entire communications sector. Rep. Mike Rogers (R-Mich.) renews hope for Congress to pass information sharing legislation this year.

Tags: technology , cybersecurity , AEI , Mike Rogers , Tom Wheeler , FCC , information sharing , Bob Dix , Jason Miller

Friday - 06/13/2014, 04:47am EDT
Listen

Jay Healey, Director of Cyber Statecraft Initiative, Atlantic Council

Congress is closer to cybersecurity legislation that tries to protect infrastructure from attacks. But Congress, and all the other organizations that make policy that affects the Internet, may be asking the wrong questions. Jay Healey, director of the Cyber Statecraft Initiative at the Atlantic Council, writes about the future of cybersecurity in National Interest Magazine. He explains on In Depth with Francis Rose what questions Congress should be asking.

Tags: Jay Healey , Atlantic Council , cybersecurity , In Depth

Friday - 06/13/2014, 04:17pm EDT
Listen

DoD reveals strategy to protect itself from hackers

The Department of Defense recognizes that it and American companies are prime targets for hackers, whether they be a nation-state or individuals. So it's put in place an operating strategy. That strategy is comprised of 5 elements: 1) a defensible architecture; 2) global situational awareness and a common operating picture; 3) a concept for operating in cyberspace; 4) trained and ready cyber forces; and 5) capacity to take action when authorized.

Tags: DoD , hackers , operating strategy , Cybersecurity Report , cybersecurity , JJ Green

Thursday - 06/05/2014, 08:51am EDT
  •  
  • 6
  •