Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: J.J. Green
For the second time, the court-martial of a U.S. Army general facing sexual assault charges has been postponed. The trial of Brig. Gen. Jeffrey A. Sinclair had been scheduled to begin at Fort Bragg next Monday. It was announced Tuesday that military Judge Col. James Pohl rescheduled the trial for Jan. 7 after a request from Sinclair's defense team. Unresolved issues are being worked out according to his civilian lawyer.
The U.S. military is laying fiber-optic cable under water to connect Guantanamo Bay Naval Base in Cuba with Florida, and the Associated Press reports it "could someday extend it to the rest of Cuba,." Ronald Bechtold, chief information officer at the Pentagon, said Friday at the war crimes tribunal, the project would be finished in about two years and vastly improve communications between the naval base and the United States."
How do you know if your computer is vulnerable to cyber-attack? USCERT The U.S. Computer Emergency Readiness Team. says many computers are sold with software already loaded. Whether installed by a computer manufacturer, operating system maker, Internet Service Provider, or by a retail store, USCERT says the first step in assessing the vulnerability of your computer is to find out what software is installed and how one program will interact with another. Unfortunately, it is not practical for most people to perform this level of analysis.
What is DHS's role in cyber security. DHS uses intrusion detection tools to monitor .gov network traffic for malicious activity and uses this resulting data to address cyber vulnerabilities. In addition, DHS issues bulletins and alerts that provide information on potential cyber threats. Last year, DHS issued more the 5,000 alerts and advisories, which it shared with various government, private sector, and critical infrastructure stakeholders; as well as the public.
The Pentagon said Wednesday conducted the second test of the ship-based Aegis missile defense system in a week, firing two SM-3 missiles to intercept a single, complex separating target in space, the U.S. Defense Department said. According to DoD, the first SM-3 that was launched, successfully intercepted the target warhead. Raytheon said the second SM-3 was launched to test the system's ability to launch multiple missiles at one time against a threat. It was not intended to intercept the target.
Lawyers in the case at Guantanamo Bay are pressing their effort to put proceedings on hold until security problems with a computer network are fixed. The chief defense counsel for military commissions spent Wednesday testifying about her April order forbidding use of a Pentagon computer network because of apparent security flaws. Air Force Col. Karen Mayberry told the court Wednesday that she lost confidence in the system after large amounts of data were lost and emails from defense lawyers disappeared.
On the Federal Drive show blog, you can listen to our interviews, find more information about the guests on the show each day, as well as links to other stories and resources we discuss.
The Washington Navy Yard shooting --the incident prompted immediate calls for reviews of base security procedures. Did it have anything to do with money? Congressman Michael Turner called for Defense Department officials to release information on an inspector general's audit of its system for controlling civilian workers' access to military bases. The Navy may have "implemented an unproven system in order to cut costs," Turner, an Ohio Republican, said in a letter dated Monday to Lynne Halbrooks, the Pentagon's acting inspector general.
Rep. Bennie G. Thompson (D-MS), Ranking Member of the Committee on Homeland Security. He said in a statement, "In recent years, social media have become useful and efficient tools for the government to communicate both to its workers and the American people. Given DHS' size and makeup, social media are particularly helpful for DHS to improve its relationship with its employees and communicate with the public during both natural and man-made disasters."
To promote cyber security practices and develop these core capabilities, DHS says it is working with critical infrastructure owners and operators to create a Cyber security Framework - a set of core practices to develop capabilities to manage cyber security risk. These are the known practices that many firms already do, in part or across the enterprise and across a wide range of sectors. The draft Framework will be complete in October.