Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: cybersecurity
HealthCare.gov was like other failed systems, the result of boiling a toxic stew of poorly defined requirements, the wrong contractor, insufficient oversight and unclear lines of authority.
Cyber security advocates are frustrated that new legislation is caught between a rock and a hard place. It's stuck in contentious debates over government surveillance and the government shutdown. NSA's highly skilled cyber workers have been told to stay home, weakening the nation's ability to protect critical cyber infrastructure. Thousands of people with PHDs and math whizzes and thousands of computer scientists have been sitting idly at home.
Homeland Security News is reporting that if hackers can steal a company's top-secret data, they can just as easily destroy a company's network. Richard Bejtlich, chief security officer for Mandiant, a cyber-security company, said not only are hackers getting into networks to steal huge amounts of intellectual property but they can also permanently erase data.
Federal employees are eligible for a free one-day training session in early November on implementing continuous monitoring. The goal is to help agencies make good use of the continuous diagnostics and monitoring contract DHS awarded in August.
The U.S. National Security Agency swept up 70.3 million French telephone records in a 30-day period, according to a newspaper report Monday that offered new details of the massive scope of a surveillance operation that has angered some of the country's closest allies. The French government summoned the U.S. ambassador for an explanation on Monday and renewed demands for talks on protection of personal data, as well as pledges that the surveillance would cease.
Russian authorities have arrested a man believed to be responsible for distributing a notorious software kit known as "Blackhole" that is widely used by cyber criminals to infect PCs, according to a person familiar with the situation. A former Russian police detective in contact with Russia's federal government told Reuters that the suspect, who is known in hacking circles as "Paunch," had been arrested.
Jason Healey, the director of the Cyber Statecraft Initiative for the Atlantic Council, endorsed an approach that would turn how government and the private sector work together to battle cyber threats on its head.
NIST issues the industry-developed final draft approach to help critical infrastructure providers secure their computer systems. The agency is accepting comments over the next couple of months and will issue a version 1.0 of the framework in February. Industry offered mixed reactions to the framework. Some said it's too broad while others said it provides a set of agreed upon basic cyber protections.
Tags: technology , NIST , Patrick Gallagher , critical infrastructure , Bob Dix , Tim Conway , McAfee , Telecommunications Industry Association , White House , Phil Agcaoili , Cox Communications , Jason Miller
Command Sgt. Maj. Rodney Harris, the senior enlisted advisor at Army Cyber Command, said the Army is doing a good job at finding the right soldiers with the necessary skill sets to become cyber warriors.