Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: NIST
Jacob Taylor, a physicist at the National Institute of Standards and Technology, is a finalist for a 2012 Service to America Medal.
Big data enthusiasts from government, industry and academia are getting their hands dirty. The National Institute of Standards and Technology and the National Science Foundation held a two-day workshop recently to explore the technologies needed to collect and analyze big data. Attendees also examined how big data can enhance areas like science, health and security. The government announced in March its plans to invest $200 million dollars in the growing field.
The White House, Congress, DoD and many others are trying to stem the tide of counterfeit products and software with malicious code from entering federal systems. The administration soon will release recommendations for how all agencies and vendors can improve the security of their products. DoD issued a memo in March requiring changes to how services protect their supply chains.
Tags: technology , cybersecurity , industry , Victoria Espinel , White House , DoD , Jon Boyens , Sandy Boyson , University of Maryland , Supply chain management , Supply chain risks , Inside the Worlds Biggest Buyer , Jason Miller
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
Tags: management , Circular A-130 , cybersecurity , Karen Evans , Frank Reeder , Dan Chenok , OMB , technology , DHS , Information Security and Privacy Advisory Board , national security systems , Jason Miller , Gail Stone , SSA , inspectors general
The National Institute of Standards and Technology is trying to demystify cloud computing for federal agencies. They've just published the final version of a document called Cloud Computing Synopsis and Recommendations. In it, NIST aims to provide a plain-language breakdown of how clouds are deployed, what services they can offer, typical terms of service, and security issues. NIST says the publication is aimed at IT decision makers, designed to help them decide what cloud technologies and configurations will meet their needs.
The Industry Botnet Group — coordinated by the White House Cybersecurity Office and the Departments of Commerce and Homeland Security — has posted nine principles, including coordination of cyber responsibilities across sectors and reporting lessons learned.
The House approved the first spending bill for 2013, setting operating budgets for the Commerce and Justice Departments and for science-related agencies, such as NASA.
The Manufacturing Extension Partnership has a goal of making U.S. manufacturers more competitive.
A working group is developing common requirements for a federated cloud identity management shared service. NIH already showed how this could be done with its iTrust tools. The tiger team is expected to issue the common standards in the next few months.
Digital signatures are mathematical algorithms that ensure authenticity of digital documents. They are specified in Federal Information Processing Standard, or FIPS 186 — 3. The standard first came out in 1994.