Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: NIST
The White House, Congress, DoD and many others are trying to stem the tide of counterfeit products and software with malicious code from entering federal systems. The administration soon will release recommendations for how all agencies and vendors can improve the security of their products. DoD issued a memo in March requiring changes to how services protect their supply chains.
Tags: technology , Cybersecurity , industry , Victoria Espinel , White House , DoD , Jon Boyens , Sandy Boyson , University of Maryland , Supply chain management , Supply chain risks , Inside the Worlds Biggest Buyer , Jason Miller
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
Tags: management , Circular A-130 , Cybersecurity , Karen Evans , Frank Reeder , Dan Chenok , OMB , technology , DHS , Information Security and Privacy Advisory Board , national security systems , Jason Miller , Gail Stone , SSA , inspectors general
The National Institute of Standards and Technology is trying to demystify cloud computing for federal agencies. They've just published the final version of a document called Cloud Computing Synopsis and Recommendations. In it, NIST aims to provide a plain-language breakdown of how clouds are deployed, what services they can offer, typical terms of service, and security issues. NIST says the publication is aimed at IT decision makers, designed to help them decide what cloud technologies and configurations will meet their needs.
The Industry Botnet Group — coordinated by the White House Cybersecurity Office and the Departments of Commerce and Homeland Security — has posted nine principles, including coordination of cyber responsibilities across sectors and reporting lessons learned.
The House approved the first spending bill for 2013, setting operating budgets for the Commerce and Justice Departments and for science-related agencies, such as NASA.
The Manufacturing Extension Partnership has a goal of making U.S. manufacturers more competitive.
A working group is developing common requirements for a federated cloud identity management shared service. NIH already showed how this could be done with its iTrust tools. The tiger team is expected to issue the common standards in the next few months.
Digital signatures are mathematical algorithms that ensure authenticity of digital documents. They are specified in Federal Information Processing Standard, or FIPS 186 — 3. The standard first came out in 1994.
GSA, NIST to name the first batch of outside organizations who will test and validate commercial cloud products against baseline security standards in the FedRAMP cloud security program in May. The Joint Authorization Board also will release guidance to industry on how to implement the security requirements in the coming months. FedRAMP still is months from approving its first set of vendors.
Tags: technology , Cybersecurity , FedRAMP , third party accreditors , cloud computing , GSA , DoD , DHS , David McClure , David DeVries , Richard Spires , Jared Serbu , AFFIRM , industry , Cybersecurity Update
National Institute of Standards and Technology wants comments about revisions to FIPS 186-3. NIST said the proposed revision includes clarifications, corrections and revisions