bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
5:38 am, January 27, 2015

Search Result

Search Tags:  cybersecurity

Alan Raul, Partner, Sidley Austin LLP

No enterprise is safe from cyber attacks these days. Federal agencies, critical infrastructure operators, even movie makers. But today, digital pirates have less to fear from the United States than did the Barbary Coast pirates of the 18th century. Alan Raul is a partner at the law firm Sidley Austin and former vice chairman of the Privacy and Civil Liberties Oversight Board. He joined Tom Temin on the Federal Drive to explain.

Tags: Alan Raul , Sidley Austin LLP , Privacy and Civil Liberties Oversight Board , technology , Federal Drive

Friday - 01/16/2015, 08:17am EST
Listen

DoD rewrites cloud security rules in move toward risk acceptance

New security guide places more trust in governmentwide FedRAMP program to secure unclassified data in commercial clouds, but retains tougher restrictions for more sensitive information.

Tags: DoD , technology , DISA , cloud computing , FedRAMP , Mark Orndorff , Dave Mihelcic , Jared Serbu

Thursday - 01/15/2015, 11:07am EST
Listen

Jasper Graham, Senior Vice President of Cyber Technologies, Darktrace

Most organizations believe in getting intruders off your network as quickly as possible. But you may be missing out on a chance to learn how hackers operate. Jasper Graham is senior vice president of cyber technologies and anlytics at Darktrace, and former Technical Director at the National Security Agency. On In Depth with Francis Rose, he explained what a "honeypot" is, and why you might want to use one.

Tags: Jasper Graham , Darktrace , hackers , In Depth , technology

Thursday - 01/15/2015, 04:49pm EST
Listen

Dan Chenok, Director, IBM Center for the Business of Government

Good customer service is just one of President Barack Obama's 15 cross-agency priority goals for agency managers in 2015. Dan Chenok is executive director of the IBM Center for the Business of Government. In his Top 3 for 2015, he tells In Depth with Francis Rose about the expectations agencies will have to provide top notch customer service.

Tags: Dan Chenok , IBM Center for the Business of Government , technology , innovation , GSA , 18F , In Depth , Top 3 for 2015

Wednesday - 01/14/2015, 03:46pm EST

Why can't the government dominate in cyber space?

Former DHS Deputy Secretary Jane Holl Lute discusses the difficulty of establishing a strong cybersecurity program within the federal government on this week's Women of Washington radio show.

Tags: Jane Holl Lute , Center for Internet Security , DHS , Women of Washington , Aileen Black , Gigi Schumm , STEM , workforce

Wednesday - 01/14/2015, 05:49pm EST

Karen Evans, Director, U.S. Cyber Challenge

Personally identifiable information for nearly 800,000 Postal Service employees was compromised in 2014. And cyber attacks also left 25,000 employees at the Homeland Security Department at risk last year. Karen Evans is the director of the U.S. Cyber Challenger and former E-Government administrator. In her top 3 for 2015, she tells In Depth with Francis Rose why the time is now for agencies to step up their cyber defense systems.

Tags: Karen Evans , U.S. Cyber Challenge , Top 3 for 2015 , In Depth , technology

Wednesday - 01/14/2015, 02:53pm EST

Robert Anderson, Executive Assistant Director, FBI

Even before recent swell of cyber attacks, the FBI was looking to beef up its cyber division to help better handle such threats. The agency is in the midst of a drive to find and hire more cybersecurity experts and turn them into special agents. Applications are due Jan. 20. Robert Anderson is executive assistant director of the FBI. He joined Tom Temin on the Federal Drive to explain the push for new cyber agents.

Tags: Robert Anderson , FBI , Tom Temin , Federal News Radio ,

Wednesday - 01/14/2015, 09:13am EST
Listen

FBI deploys 30,000 Android smartphones to field offices

The FBI rapidly rolled out new devices-the vast majority running hardened Android operating systems-to the bureau's 56 field offices over the last four months. But officials are experimenting with commercial mobile devices for secret and top-secret data too.

Tags: technology , mobile computing , FBI , David Rubin , AFCEA , Android , Samsung , Jared Serbu

Wednesday - 01/14/2015, 05:13am EST
Listen

In OPM cyber breach, security experts spy fundamental problem

While it's far from a full-fledged cyberattack, the "technical malfunction" that besieged an Office of Personnel Management Web portal Monday underscores a governmentwide problem that's not easy to fix, according to experts.

Tags: OPM , Elijah Cummings , KeyPoint Government Solutions , GAO , Greg Wilshusen , Simon Crosby , Bromium , Alan Paller , SANS Institute , Emily Kopp

Tuesday - 01/13/2015, 06:20pm EST
  •  
  • 2
  •