Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Einstein
DHS says it found out about the Heartbleed vulnerability at the same time everyone else did. But unlike most other organizations, it had to wade through layers of legal negotiations before it could help federal agencies fix the cyber vulnerability in their own systems.
Suzanne Spaulding, the nominee to be the deputy undersecretary of the National Protection and Programs Directorate, told Senate lawmakers DHS had to reduce the number of federal devices that will be covered by the CDM program because of budget shortfalls.
Brendan Goode, the director of network security deployment in the National Protection and Programs Directorate in DHS, said 15 out of the initial 23 agencies expected to implement Einstein 3 have signed memorandums of agreements with the department. E3A will use both unclassified and classified indicators to understand risks and vulnerabilities of federal networks.
The White House has threatened to veto a House bill providing funding for the Homeland Security Department, taking issue with many of the bill's provisions, including a denial of a civilian pay raise. The committee bill also doesn't include any new funding for the agency's data-center consolidation efforts or construction for its new headquarters.
DoJ opinion states the intrusion detection application does not violate Fourth Amendment rights or several other federal and state laws. Department's view follows Bush administration position.
Agencies must tell DHS, OMB how they will meet reduce the number of Internet connections they run. Some departments also have to estimate cost to meet TIC through Networx contract by Sept. 30.
An interagency working group is trying to decide whether the administration should submit a proposal to Congress to update several laws. The White House's cyberspace review recommended legislative updates to address shortcomings in the current statutes. Justice also reviewed the Einstein 3 program even as DHS still is testing it.
Tags: technology , James Baker , Phil Reitinger , Sheldon Whitehouse , Justice , DHS , Senate Judiciary Committee , Center for Democracy and Technology , cybersecurity , national incident response plan
DHS is in the final stages of deploying version 2 of Einstein across the government, and already is making plans for version 3.
Tags: In Depth , Francis Rose , Janet Napolitano , DHS , technology , management , Peter King , Bennie Thompson , House Homeland Security Committee , George Washington University , cybersecurity , TWIC , terrorism alert system , Supply chain security , Jason Miller
Secretary Janet Napolitano said the Einstein 3 software will be deployed across the government to detect and disrupt malicious cyber activity. Cybersecurity among the hot topics Napolitano highlighted during her State of Homeland Security address.
Tags: technology , management , Janet Napolitano , DHS , Peter King , Bennie Thompson , House Homeland Security Committee , George Washington University , cybersecurity , TWIC , terrorism alert system , Supply chain security , Jason Miller
The National Cybersecurity Protection System is testing software and hardware from the Defense Department and industry to figure out how to expand the Einstein toolset. DHS reports that 13 of 19 major agencies already have installed Einstein 2. The department also is planning to hold an industry day for a classified cyber RFI.