Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: cybersecurity
Malware not being looked for on mobile devices; Zeus v3 targets Spain, Germany, UK, and USA banks,
Learn more in today's cybersecurity update.
Maryland recently denied Baltimore Gas and Electric Company authorization to deploy smart meters, arguing the potential financial and technological risks to consumers outweighed the benefits. Is this the beginning of the end for the Smart Grid? We ask Lisa Margonelli, director, Energy Policy Initiative at the New America Foundation.
Microsoft to release patch that will strengthen data security
DHS gets official oversight over all civilian agency computer networks.
The General Services Administration is reiterating its promise to boost cybersecurity and privacy of cloud computing.
As part of the so-called FEDRAMP program, beginning this fall an interagency group will inspect vendors' cloud computing facilities to make sure they meet federal security standards. If the group certifies a cloud facility, agencies would be able to sign up for service without having to further inspect the facility.
U.S. officials have largely ruled out North Korea as the origin of a computer attack last July that took down U.S. and South Korean government websites.
But, authorities aren't much closer than they were a year ago to knowing exactly who did it, or why.
Early analysis of the fast-moving "denial of service" attacks pointed to North Korea since code used included Korean language.
Experts say agencies are better prepared today, but that many government and business sites remain vulnerable to similar attacks.
The so-called "continuous monitoring" of systems is becoming a hot topic in government. That's because under federal guidelines, agencies must report how they protect their information systems, plus, agencies are now required to submit real-time data about the state of their networks.
Continuous monitoring doesn't mean systems have to be watched every minute. Even now, some agencies are able to monitor their systems through international networks at least once a day.