bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
9:22 am, October 30, 2014

Search Result

Search Tags:  NIST

Fed invents most accurate clock in the world

If you are a sticker for time then your in luck.

Tags: technology , Sammies , Sammies 2010 , Till Rosenband , Partnership for Public Service , Dorothy Ramienski , DorobekInsider

Tuesday - 06/29/2010, 04:55pm EDT

Feds lead Smart Grid development effort

The Senate is now considering a bill, approved last week by the House, designed to help the nation's electrical grid evolve into an enhanced Smart Grid which would help protect itself from cyber-attacks. In addition, however, the Smart Grid is also expected to help the nation do a better job of managing our electrical resources. A group of federal employees recently talked about their role in developing the Smart Grid.

Tags: technology , AFFIRM , Eric Lightener , DoE , David Wollman , Nick Sinai , FCC , Max Cacas , Smart Grid

Tuesday - 06/15/2010, 07:15am EDT
Listen

CIO Council report on cloud sets future vision

The document highlights work being done by NIST, standards working group and budget guidance to agencies. NIST to come out with several special publications to help agencies implement cloud computing. The CIO Council also includes use cases on 30 different cloud implementations.

Tags: technology , Vivek Kundra , OMB , GSA , DISA , RAT Board , CIO Council , cloud computing , data center consolidation , Jason Miller

Wednesday - 05/26/2010, 03:59pm EDT

FISMA's facelift focuses on four areas, for now

DHS is leading the effort to rework cybersecurity metrics around patch, configuration, vulnerability and inventory management. Justice plans to host an industry day in June to tell vendors how cyberscope works. NIST will issue new cyber publications and GSA plans on new RFP for situational awareness and incident response tools.

Tags: technology , Matt Coose , Marianne Swanson , DHS , Justice , GSA , OMB , cybersecurity , FISMA , Cyberscope , SmartBUY , situational awareness and incident response tools , Management of Change , Jason Miller

Tuesday - 05/25/2010, 06:43pm EDT
Listen

NIST to coordinate interagency cyber effort

Computer breaches starting to level off, GISLA awards open for nominations

Tags: Federal Drive , Cybersecurity Update , cybersecurity , OPM , DHS , education , Commerce , National Initiative for Cyber Education , White House , Office of Science and Technology Policy

Friday - 04/30/2010, 08:30am EDT

Rockefeller stumps for cybersecurity

The Senate is now considering one of several cybersecurity bills now making their way through the U.S. Congress. The principal co-author of one bill spoke to a software industry group holding a cybersecurity forum at the Newseum yesterday.

Tags: technology , cybersecurity , BSA , Newseum , Jay Rockefeller , Olympia Snowe , 2010 Cybersecurity Forum , Senate Commerce Science and Transportation Committ , Gary Locke , Commerce , Department of Education , OPM

Friday - 04/30/2010, 07:56am EDT
Listen

NIST restructuring bill passes committee

Major malware campaign abuses unfixed PDF flaw

Tags: Cybersecurity Update , cybersecurity , technology , mngt , pdf flaw , malware

Thursday - 04/29/2010, 08:30am EDT

All about upcoming conferences

Amtower gets the latest on upcoming conferences that you should attend.
March 15, 2010

Tags: OSDBU , FISSEA , DHS , NIH , National Veterans Small Business Conference , GDIT , Lockheed Martin

Monday - 03/15/2010, 01:46pm EDT
Listen

Federal Information Security - The Shift to a Risk Management Framework

The National Institute of Standards and Technology's (NIST) recent release of Special Publication 800-37, Revision 1 Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach is an important change in the direction of how federal agencies achieve information security and manage information system-related security risks. It shifts the focus away from a point in time Certification and Accreditation (C&A) approach to compliance towards continually assessing risk and security authorization. As a result, the federal information security community is sending a message to the broader federal community and creating an important discussion: the cyber threat is real and must be addressed in the context of its potential impact on an organization. Cyber security is not as simple as a "check the box" requirement. The paradigm shift away from point in time security and towards obtaining situational awareness of the organization's risk posture must be as pervasive in the federal government as the cyber threats are against us.

Regarding the impact on agency security procedures, the publication is clear on the focus of its new framework, stating:

    The revised process emphasizes: (i) building information security capabilities into federal information systems through the application of state-of-the-practice management, operational, and technical security controls; (ii) maintaining awareness of the security state of information systems on an ongoing basis through enhanced monitoring processes; and (iii) providing essential information to senior leaders to facilitate decisions regarding the acceptance of risk to organizational operations and assets, individuals, other organizations, and the Nation arising from the operation and use of information systems.


This new Risk Management Framework builds much needed flexibility into the overall federal information security lifecycle to address the increasing nature and scope of threats in real-time, providing a number of key advantages that include:
  • Continually evaluating the organization's risk posture and maintaining situational awareness of its cyber security posture
  • Understanding the state and maturity of an agency's cyber security program
  • Evaluating cyber security programs at key vulnerability points: people, processes, and technology
  • Maintaining a focus on the security program lifecycle
  • Addressing the key functions (governance, risk, management, compliance, operations) of a security program


Perhaps most importantly, agency security programs will be better positioned to evolve and mature - an absolute necessity for staying ahead of the growing and dynamic threat to our Nation's cyber security.

Tags: technology , Trusted Advisor Blog , risk management , Federal Information Security ,

Wednesday - 03/03/2010, 07:39pm EST

FCC warns iPad could clog the internet

"Apple's iPad announcement has set off a new round of reports of networks unburdened by a data flow they were not built to handle," Phil Bellaria, director of scenario planning for broadband, and John Leibovitz, deputy chief of the FCC's wireless telecom bureau, wrote in a Monday blog post.

Tags: Cybersecurity Update , Cybersecurity Workforce , iPad , Apple , Cyber Security Enhancement Act of 2009 , Twitter , PayPal , FBI , Pushdo , tech

Wednesday - 02/03/2010, 08:34am EST
  •  
  • 32
  •