Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: NIST
Agencies and universities are refining job descriptions, revamping training and education programs and helping industry, academia and government to begin to reach consensus on the makeup of a modern-day cybersecurity workforce. The Office of Personnel Management also has made changes to personnel systems so that job descriptions map to the framework. The plan already has had in impact on cyber education at colleges and universities across the country.
Tags: cybersecurity , technology , DHS , NSA , DISA , Peggy Maxon , Roger Greenwell , Charles Clancy , Virginia Polytechnic Institute and State University , Hume Center for National Security and Technology , Jared Serbu , INSA , workforce
A number of agencies have made high-profile migrations to cloud platforms and the Obama administration has issued sweeping guidance mandating agencies identify and transition services and applications to host in the cloud. For a look at how agencies are faring in their shifts to the cloud and the issues they continue to face, the Federal Drive with Tom Temin and Emily Kopp hosted a panel discussion, "Clearing the Fog Around Cloud Computing," sponsored by Level 3 Communications.
The agency plans to release solicitations to help agencies implement sensors to detect threats, followed by industry-provided services to analyze them. Congress approved $183 million to begin in 2013 to help get continuous monitoring off the ground more quickly.
Dave Waltermire, security automation architect, Computer Security Division, at NIST, will talk about the upcoming conference and security automaton.
September 25, 2012
Tags: technology , cybersecurity , National Cybersecurity Awareness Month , security automation , Security IT Automation Conference , David Waltermire , software assurance , incident response , analytics , trusted computing , John Gilroy , Federal Tech Talk
The Government Accountability Office said reports of malware targeting mobile devices have nearly tripled in less than a year.
OMB sent a Sept. 30 target date for departments to implement IPv6. NIST statistics show a majority of the government's networks will not change over from the older IPv4 in the next week.
The National Institute of Standards and Technology wants comments on new draft guidelines for securing Basic Input Output System systems. BIOS is the first software activated after turning a computer on and has increasingly become a new target for hackers.
The military, working through DARPA, is trying to develop its own marketplace of apps for helping troops in the field.
The National Institute of Standards and Technology is working on updating guidelines for Transport Layer Security. That technology prevents anyone from eavesdropping on Internet communications.
An updated how-to guidance for responding to cyber incidents is out.