Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Cybersecurity
On this week's Capital Impact show, Liberty Group Ventures President Kiersten Todt will discuss how corporations and the general public are handling the rollout of the cybersecurity framework.
November 13, 2013
Federal News Radio Defense Reporter Jared Serbu was on-site at the 2013 AUSA Conference. While there, Jared had the chance to speak with Army officials on some of the biggest topics and issues facing the service.
On this week's Capital Impact show, Bloomberg Government analysts will examine NIST's preliminary cybersecurity framework, and Google's lobbying efforts.
November 7, 2013
Tags: acquisition , contracting , lobbying , cybersecurity , critical infrastructure , Google , Northrup Grumman , Federal Trade Commission , Allen Scott , Sanford Reback , Todd Shields , Bloomberg Government , Capital Impact
Inside the Reporter's Notebook: OMB adds clarity to new cyber policy; Cyber risks during shutdown overstated; OASIS delayed indefinitely
The White House is finalizing its first major cybersecurity policy in more than three years.
Tags: technology , cybersecurity , government shutdown , OMB , Sylvia Burwell , continuous monitoring , GSA , OASIS , contracting , James Clapper , ODNI , Keith Alexander , DoD , security clearances , Greg Elin , FCC , James Cochrane , USPS , Ellis Burgoyne , chief data officer , Inside the Reporters Notebook , Jason Miller
Eugene Spafford, a professor of computer science at Purdue University, and the executive director of the Center for Education and Research in Information Assurance and Security (CERIAS), a campus-wide institute for cybersecurity, said feds need to be held responsible for cyber problems and that would help improve the overall security state of the government.
October 17, 2013
Gen. Keith Alexander, head of the U.S. Cyber Command and the National Security Agency, said the greatest impact of the ongoing government shutdown on cybersecurity is on the morale of the cyber workforce.
Tags: Keith Alexander , NSA , U.S. Cyber Command , Central Security Service , GDIT Cyber Reports , cybersecurity , Cybersecurity Workforce , workforce , government shutdown , National Cybersecurity Awareness Month , Michael OConnell
Your agency's chief information security officer has a problem that might not have a solution. The online ecosystem of apps and mobile devices is creating a perfect storm of incoming threats and financial challenges. Hord Tipton, executive director of the information security non-profit (ISC)², is the former chief information officer of the Interior Department.
Even though government agencies are in shutdown mode, contractors are still moving ahead in making business decisions. Small businesses are likely to hurt more from the shutdown due to smaller cash reserves and slimmer margins.
Officials say that an advertising firm must immediately stop using its network of high-tech trash cans to track people walking through London's financial district. The City of London Corporation says it has demanded Renew pull the plug on the program, which measures the Wi-Fi signals emitted by smartphones to follow commuters as they pass the garbage cans.
Kelly Jackson Higgins wrote in her "Hacking The Adobe Breach" column, "At first glance, the massive breach at Adobe that was revealed last week doesn't neatly fit the profile of a pure cybercrime attack." She said not only did the bad guys steal customer data and payment info, but they also got ahold of the company's source code for Adobe's ColdFusion, Acrobat, and Reader software. Criminal investigators are looking into whether it was an accident or they deliberately went after the source code.