Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: cybersecurity
The Homeland Security Department's Office of Inspector General took a look at DHS' information security program and practices and found them lacking.
CYPTOLOCKER is a type of Ransomware that restricts access to infected computers and requires victims to pay a ransom in order to rescue their computers from criminals who take them over. It's so sophisticated that one US police force was hit by the virus and forced to pay a ransom using a new virtual currency called bit coins. Pfishing emails --which look legitimate, with subject lines like "payroll or package delivery" are the usual method of delivery.
Every day it seems there's a new Cyber Security threat. Everything from ransom ware to zero day issues. Cyber security insurance has been the way that companies have tried to offset the risk of online attacks and data loss, but the insurers were missing the information they needed to convince potential clients to buy their products. But now threat intelligence is helping them gauge the risk that potential customers might encounter.
A pilot project is part of NSA's push to layer commercial technologies and standards on top of one another to achieve security goals more quickly. This approach would replace the government-specific IT solutions that can take years and millions of dollars to develop.
Emerging technologies like cloud, wireless access and virtualization are making telework an easy -- and economic -- solution for some agencies.
The Office of Management and Budget released a new memo Tuesday detailing the steps and deadlines agencies must meet to implement information-system continuous monitoring. The mandate comes on the heels of the General Services Administration and the Homeland Security Department releasing the first task order for continuous diagnostics and mitigation (CDM) tools and sensors, of which Federal News Radio has exclusive details.
Collaboration is the name of the game when it comes to many of the Homeland Security Department's cybersecurity efforts. Doug Maughan, director of DHS' Cybersecurity Division in the department's Science and Technology Directorate, discussed the department's cyber partnerships as part of the Federal News Radio special report, A New Era in Technology.
The chief information and chief technology offices at the Commerce Department have generated more than $200 million in savings by taking a collaborative approach to purchasing IT and cybersecurity products.
A unified IT architecture will create innumerable benefits to government and the private sector companies that serve its technology needs. But, disparate policymaking responsibilities across organizations such as OMB, GSA, NIST, DHS, and DoD make it difficult to realize that end game, say former federal executives Karen Evans and Julie Anderson.
The troubled HealthCare.gov website has been the subject of at least one attempted but unsuccessful cyber attack, according to one of the of the Homeland Security Department's top cyber officials. Lawmakers at a House Homeland Security Committee hearing said the consolidation of personal information and the glitch-prone website are cause for concern.