Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Einstein
Suzanne Spaulding, the nominee to be the deputy undersecretary of the National Protection and Programs Directorate, told Senate lawmakers DHS had to reduce the number of federal devices that will be covered by the CDM program because of budget shortfalls.
Brendan Goode, the director of network security deployment in the National Protection and Programs Directorate in DHS, said 15 out of the initial 23 agencies expected to implement Einstein 3 have signed memorandums of agreements with the department. E3A will use both unclassified and classified indicators to understand risks and vulnerabilities of federal networks.
The White House has threatened to veto a House bill providing funding for the Homeland Security Department, taking issue with many of the bill's provisions, including a denial of a civilian pay raise. The committee bill also doesn't include any new funding for the agency's data-center consolidation efforts or construction for its new headquarters.
DoJ opinion states the intrusion detection application does not violate Fourth Amendment rights or several other federal and state laws. Department's view follows Bush administration position.
Agencies must tell DHS, OMB how they will meet reduce the number of Internet connections they run. Some departments also have to estimate cost to meet TIC through Networx contract by Sept. 30.
An interagency working group is trying to decide whether the administration should submit a proposal to Congress to update several laws. The White House's cyberspace review recommended legislative updates to address shortcomings in the current statutes. Justice also reviewed the Einstein 3 program even as DHS still is testing it.
Tags: technology , James Baker , Phil Reitinger , Sheldon Whitehouse , Justice , DHS , Senate Judiciary Committee , Center for Democracy and Technology , cybersecurity , national incident response plan
DHS is in the final stages of deploying version 2 of Einstein across the government, and already is making plans for version 3.
Tags: In Depth , Francis Rose , Janet Napolitano , DHS , technology , management , Peter King , Bennie Thompson , House Homeland Security Committee , George Washington University , cybersecurity , TWIC , terrorism alert system , supply chain security , Jason Miller
Secretary Janet Napolitano said the Einstein 3 software will be deployed across the government to detect and disrupt malicious cyber activity. Cybersecurity among the hot topics Napolitano highlighted during her State of Homeland Security address.
Tags: technology , management , Janet Napolitano , DHS , Peter King , Bennie Thompson , House Homeland Security Committee , George Washington University , cybersecurity , TWIC , terrorism alert system , supply chain security , Jason Miller
The National Cybersecurity Protection System is testing software and hardware from the Defense Department and industry to figure out how to expand the Einstein toolset. DHS reports that 13 of 19 major agencies already have installed Einstein 2. The department also is planning to hold an industry day for a classified cyber RFI.
Federal agencies scrambling on DNSSEC implementation