bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
6:32 pm, May 29, 2015

Search Result

Search Tags:  cybersecurity

Agencies neglecting cybersecurity in strategic plans, research finds

New research shows departments do not incorporate cybersecurity efforts into their goals and objectives, said Kevin Desouza, the associate dean for research at the college of public programs at Arizona State University and a non-resident senior fellow of Governance Studies at the Brookings Institution.

Tags: Technology , Cybersecurity , strategic planning , Kevin Desouza , Arizona State University , Brookings Institution , Critical infrastructure , Ask the CIO , Jason Miller

Thursday - 02/19/2015, 03:03pm EST
Listen

CIO Council to approve one standard for mobile app vetting

The Defense Department's National Information Assurance Partnership's (NIAP) protection profile will be the governmentwide standard for agencies to use when ensuring the security of mobile apps. The Mobile Technology Tiger Team recommended the NIAP approach because of the collaboration and coordination across government and with industry.

Tags: Technology , Mobile computing , Derived credentials , Cybersecurity , Rob Palmer , DHS , Jeanne Peterson , National Information Assurance Partnership , NIST , Tom Karygiannis , Greg Youst , DoD , DISA , Mike McCarty , HSPD-12 , MobileGov , Jason Miller

Thursday - 02/19/2015, 04:02am EST

Col. Jeff Schilling (Ret.), Chief Security Officer, FireHost

Information sharing is a two-way street with road hazards in both directions. President Barack Obama held the first White House Cybersecurity Summit last week and issued an Executive Order with hopes of fostering a more open exchange between government and the private sector. Jeff Schilling is the chief security officer for FireHost. He once directed the global Security Operations Center under U.S. Army Cyber Command and has seen the challenges from both sides. On the Federal Drive with Tom Temin, he pointed out cybersecurity was only one of the topics the glitterati actually discussed.

Tags: Col. Jeff Schilling , Federal Drive , Tom Temin , FireHost , Information sharing , Cybersecurity , Barack Obama , executive order

Thursday - 02/19/2015, 09:38am EST
Listen

Hurd: 'Three-Legged Stool' key to federal IT reform

Rep. Will Hurd (R-Texas) has four top priorities as new chairman of House Oversight and Government Reform Subcommittee on IT, and he wants to use a "three-legged stool" approach to realize them.

Tags: Will Hurd , Congress , House , Technology , Cybersecurity , In Depth , House Oversight and Government Reform Subcommittee on IT , information technology , Sean McCalley

Tuesday - 02/17/2015, 02:51pm EST

Eric Mill, Technologist, 18F Team, General Services Administration

A handful of government websites are taking at least one step toward making themselves more secure. They're hardcoding a security protocol that would make it more difficult for outsiders to intercept a visitor's connection. That's according to 18F, the General Services Administration's tech team. Eric Mill, a technologist and member of the 18F team, joined Tom Temin on the Federal Drive to discuss the upgrade.

Tags: Eric Mill , GSA , Cybersecurity , Tom Temin , Federal Drive , Technology

Tuesday - 02/17/2015, 09:41am EST
Listen

Navy can't afford to fix all of its cyber vulnerabilities, so time to prioritize

A task force assigned to take a holistic view of the Navy's cybersecurity posture catalogues security holes across the Navy enterprise, and concludes that plugging each one would cost an absurd amount of money.

Tags: DoD , Navy , Technology , Task Force Cyber Awakening , Cybersecurity , NMCI , Matthew Swartz , Brian Marsh , Jared Serbu

Monday - 02/16/2015, 04:20am EST
Listen

Postal Service back to normal after electronic glitch fixed

The U.S. Postal Service says it's fixed the electronic glitch that had disrupted some services -- and that everything is back to normal.

Tags: USPS , Cybersecurity , Technology

Saturday - 02/14/2015, 05:28pm EST

The nature of cyber intelligence

Lance James, head of cyber intelligence at Deloitte, will discuss the evolution of the cyber intelligence field, and how that is forcing the government and private companies to change how they protect themselves from cyber attacks.
February 13, 2015

Tags: workforce , Technology , Cybersecurity , cyber intelligence , Lance James , Deloitte , Cyber Threat Intelligence Center , Derrick Dortch , Fed Access

Friday - 02/13/2015, 08:28pm EST
Listen

Technical problem -- not hackers -- takes out USPS email

The U.S. Postal Service is experiencing a nationwide IT outage today that's impacting USPS email accounts and some services at retail locations across the country.

Tags: USPS , Technology , Cybersecurity , Toni Delancy , Michael OConnell

Friday - 02/13/2015, 02:03pm EST
  •  
  • 12
  •