bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
6:37 am, July 11, 2014

Search Result

Search Tags:  cybersecurity

DHS striving to avoid 'tragic mistake' under cyber program

Under the continuous diagnostics and mitigation program, DHS wants to ensure systems administrators have data on the most pressing threats and vulnerabilities first so they can fix them as soon as possible. John Streufert, DHS's director of federal network resilience, said the recently-awarded dashboard will be set up to do just that.

Tags: technology , DHS , Jason Miller , Alan Paller , SANS Institute , continuous diagnostics and mitigation , AFCEA , John Streufert

Thursday - 05/29/2014, 04:30am EDT
Listen

Richard Stiennon, Security Analyst, IT Harvest

You are the key to stopping an insider threat and preventing a cyber incident at your agency even if you don't work in the IT department. Richard Stiennon is the host of the Security Current blog, the founder of IT Harvest and the author of Surviving Cyberwar. He says there are two categories of insider threats and identifying the most dangerous kind depends on you.

Tags: Richard Stiennon , IT Harvest , technology , In Depth

Wednesday - 05/28/2014, 05:59pm EDT
Listen

DoD finalizing tech specs for Joint Information Environment

DoD's Joint Technical Synchronization Office is still working through thousands of comments from hundreds of engineers across the military, but the department is hoping to have a solid technical framework for the Joint Information Environment in place by the end of this year.

Tags: DoD , technology , Joint Information Environment , Joint Staff , Defense Information Systems Agency , Mark Bowman , Brian Dravis , David Stickley , Jared Serbu

Tuesday - 05/27/2014, 04:40am EDT
Listen

Dan Waddell, Director of Government Affairs, (ISC)2

Few matters have vexed the government as much as cybersecurity. Just recently, officials from the Homeland Security Department pressed Congress for the umpteenth time to pass legislation clarifying who's supposed to do what to protect federal networks. Dan Waddell, who has long cybersecurity experience in government and industry, has just become the director of government affairs for the training and certification group, (ISC)2. He joins the Federal Drive with Tom Temin and Emily Kopp to discuss the biggest cyber challenges agencies still face.

Tags: technology , Dan Waddell , (ISC)2 , Federal Drive , Tom Temin , Emily Kopp

Friday - 05/23/2014, 09:54am EDT
Listen

GSA's Office of Government-wide Policy focused on identity security, cybersecurity

GSA Office of Government-wide Policy Chief of Staff Stephanie Rivera discusses efforts to create a standardized operating process for all agencies, and the challenges and opportunities that go along with it.

Tags: Agency of the Month , GSA , Stephanie Rivera , technology , IT , security , Office of Government-wide Policy , Jason Fornicola , best practices

Thursday - 05/22/2014, 02:02pm EDT

DARPA launches challenge to help create hacker-proof software

The Cyber Grand Challenge, set to launch for the first time two weeks from now, aims to encourage the development of computing systems that can seek out cybersecurity weaknesses better than humans can.

Tags: DoD , DARPA , Cyber Grand Challenge , Michael Walker , Jared Serbu , technology

Thursday - 05/22/2014, 01:48pm EDT
Listen

DHS' push for clearer cyber authorities moves to the House

Larry Zelvin, the director of the National Cybersecurity and Communications Integration Center in DHS's National Protection and Programs Directorate, is expected to tell the House Homeland Security Committee Wednesday that the implementation of the advanced intrusion detection and prevention program known as Einstein is hampered by the lack of clarity of the exact role DHS is allowed to play under the current set of cybersecurity laws.

Tags: technology , DHS , Larry Zelvin , FBI , Joseph Demarest , information sharing , Congress , House Homeland Security Committee , Heartbleed , Jason Miller

Wednesday - 05/21/2014, 06:10am EDT

How much damage has Chinese hacking done to the US government?

A government report indicates more than 40 Pentagon weapons programs and nearly 30 other defense technologies have been compromised by cyber intrusions from China. The cybersecurity firm Mandiant issued a report last year alleging links between a secret Chinese military unit and years of cyber-attacks against U.S. companies. Alcoa World Alumina, Westinghouse Electric Co., Allegheny Technologies, U.S. Steel Corp., the United Steelworkers Union and Solar-World are just six companies the Justice Department says were victims of Chinese hacking. U.S. officials suggest there are many more amounting to billions of dollars in economic losses.

Tags: China , DoD , Mandiant , Alcoa World Alumina , Westinghouse Electric Co. , Allegheny Technologies , U.S. Steel Corp. , United Steelworkers , Solar-World , DOJ

Tuesday - 05/20/2014, 05:47pm EDT

All things contracting with IBM's Anne Altman

Anne Altman, general manager of Federal Government for IBM, will discuss a wide range of contracting topics with host Mark Amtower.
May 19, 2014

Tags: acquistion , contracting , IBM , Anne Altman , cloud computing , big data , Healthcare IT , government IT , Small business contracting , Mark Amtower , Amtower Off Center

Monday - 05/19/2014, 09:48pm EDT
Listen

Richard Stiennon, cybersecurity analyst

Software assurance policies could be a foundation principle for cybersecurity at your agency in the next five years. That's a prediction from Richard Stiennon, the host of the Security Current blog, the founder of IT Harvest and the author of Surviving Cyberwar. Stiennon tells In Depth with Francis Rose he sees a cybersecurity culture shift inside the beltway.

Tags: Richard Stiennon , IT Harvest , In Depth

Monday - 05/19/2014, 05:03pm EDT
Listen
  •  
  • 5
  •