bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
11:15 pm, October 31, 2014

Search Result

Search Tags:  NIST

USPS fighting back against the insider threat

The Postal Service's E-Access system helps control employee access to systems and data. The single sign-on environment lets managers and database owners assign privileges to employees based on need.

Tags: cybersecurity , Cybersecurity Update , Jason Miller , technology

Friday - 07/06/2012, 05:33am EDT
Listen

In Depth interviews - June 27

On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.

Tags: In Depth , Francis Rose , Chuck Romine , cybersecurity , Arthur Friedlander , Service to America Medal

Wednesday - 06/27/2012, 05:44pm EDT

Cybersecurity center aims at increasing business-government collaboration

NIST launched the National Cybersecurity Center of Excellence in February and now is giving industry details on how it will work. The center's goal is to bring businesses and government together to solve cyber problems.

Tags: National Cybersecurity Center for Excellence , cybersecurity , technology , Donna Dodson , industry , Curt Barker , Matt Scholl , Patrick Gallagher , Public-private partnership , Karen Waltermire , Henry Wixon , Cooperative Research and Development Agreement , Esther Carey , Federal Drive , Cybersecurity Update

Thursday - 06/28/2012, 06:44am EDT
Listen

Stopping Advanced Persistent Threats (APTs)

T.K. Keaninni, chief technology officer for nCircle joins host John Gilroy to talk about how his company can help your agency with its network security issues.
June 26, 2012

Tags: technology , cyber attacks , cyber security , Flame , Stuxnet , advanced persistent threats , nCircle , network security , TK Keaninni , security content automation protocol , CISSP , John Gilroy , Federal Tech Talk

Tuesday - 06/26/2012, 11:08pm EDT
Listen

Agencies struggle to grasp mobile cybersecurity

NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.

Tags: technology , mobile computing , Sean Donelan , DHS , Ron Ross , cybersecurity , Digital Government Strategy , AFCEA , HSPD-12 , Jason Miller

Thursday - 06/21/2012, 10:37am EDT
Listen

IT security

Gordon Gillerman and Matt Scholl of NIST discuss standards, certification and accreditation with host John Gilroy.
June 19, 2012(Encore presentation December 25, 2012)

Tags: technology , Department of Commerce , measurement and standards , information technology security , Gordon Gillerman , Matt Scholl , duplication , cloud computing

Tuesday - 06/19/2012, 09:51pm EDT
Listen

NIST physicist advancing molecular medical imaging

Jacob Taylor, a physicist at the National Institute of Standards and Technology, is a finalist for a 2012 Service to America Medal.

Tags: Jacob Taylor , technology , medical imaging , Service to America Medal , Sammies

Monday - 06/18/2012, 09:09am EDT
Listen

NIST hosts two-day workshop on big data

Big data enthusiasts from government, industry and academia are getting their hands dirty. The National Institute of Standards and Technology and the National Science Foundation held a two-day workshop recently to explore the technologies needed to collect and analyze big data. Attendees also examined how big data can enhance areas like science, health and security. The government announced in March its plans to invest $200 million dollars in the growing field.

Tags: The Big Data Report , technology , health

Friday - 06/15/2012, 04:45pm EDT

Agencies, vendors ramping up to fight supply chain cyber threats

The White House, Congress, DoD and many others are trying to stem the tide of counterfeit products and software with malicious code from entering federal systems. The administration soon will release recommendations for how all agencies and vendors can improve the security of their products. DoD issued a memo in March requiring changes to how services protect their supply chains.

Tags: technology , cybersecurity , industry , Victoria Espinel , White House , DoD , Jon Boyens , Sandy Boyson , University of Maryland , Supply chain management , Supply chain risks , Inside the Worlds Biggest Buyer , Jason Miller

Friday - 06/15/2012, 12:59pm EDT
Listen

OMB alumni to suggest revisions to cyber section of A-130

The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.

Tags: management , Circular A-130 , cybersecurity , Karen Evans , Frank Reeder , Dan Chenok , OMB , technology , DHS , Information Security and Privacy Advisory Board , national security systems , Jason Miller , Gail Stone , SSA , inspectors general

Friday - 06/01/2012, 05:43am EDT
Listen
  •  
  • 10
  •