Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: cybersecurity
Malware not being looked for on mobile devices; Zeus v3 targets Spain, Germany, UK, and USA banks,
Learn more in today's cybersecurity update.
Maryland recently denied Baltimore Gas and Electric Company authorization to deploy smart meters, arguing the potential financial and technological risks to consumers outweighed the benefits. Is this the beginning of the end for the Smart Grid? We ask Lisa Margonelli, director, Energy Policy Initiative at the New America Foundation.
Microsoft to release patch that will strengthen data security
DHS gets official oversight over all civilian agency computer networks.
The General Services Administration is reiterating its promise to boost cybersecurity and privacy of cloud computing.
As part of the so-called FEDRAMP program, beginning this fall an interagency group will inspect vendors' cloud computing facilities to make sure they meet federal security standards. If the group certifies a cloud facility, agencies would be able to sign up for service without having to further inspect the facility.
U.S. officials have largely ruled out North Korea as the origin of a computer attack last July that took down U.S. and South Korean government websites.
But, authorities aren't much closer than they were a year ago to knowing exactly who did it, or why.
Early analysis of the fast-moving "denial of service" attacks pointed to North Korea since code used included Korean language.
Experts say agencies are better prepared today, but that many government and business sites remain vulnerable to similar attacks.
The so-called "continuous monitoring" of systems is becoming a hot topic in government. That's because under federal guidelines, agencies must report how they protect their information systems, plus, agencies are now required to submit real-time data about the state of their networks.
Continuous monitoring doesn't mean systems have to be watched every minute. Even now, some agencies are able to monitor their systems through international networks at least once a day.