Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Search Tags: cybersecurity
Software assurance policies could be a foundation principle for cybersecurity at your agency in the next five years. That's a prediction from Richard Stiennon, the host of the Security Current blog, the founder of IT Harvest and the author of Surviving Cyberwar. Stiennon tells In Depth with Francis Rose he sees a cybersecurity culture shift inside the beltway.
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities.
Tags: Jason Miller , Inside the Reporters Notebook , Dan Tangherlini , Dave McClure , 18F , GSA , technology , Matt Chessen , State , Roger Waldron , PTO , sequestration , Tony Scardino , HSPD-12 , DoD , Phyllis Schneck
Sen. Tom Carper (D-Del.), chairman of the Homeland Security and Governmental Affairs Committee, said Thursday the committee plans to mark up a bill on May 21 to give DHS more tools to hire cyber workers more easily.
The Pentagon has issued a final rule for dealing with counterfeit parts. Officials believe too many of them make their way into crucial electronic systems, threatening their reliability or compromising their security. The rule has been a long time coming. It affects both government buyers and industry suppliers. Joe Petrillo, a procurement attorney with the law firm Petrillo & Powell, spoke about some of the main aspects of the rule with Tom Temin and Emily Kopp on the Federal Drive.
The National Institute of Standards and Technology has launched a four-part plan to help agencies build more secure IT systems. NIST Computer Scientist Ron Ross, who guided a new publication on the issue, tells the Federal Drive with Tom Temin and Emily Kopp that the same engineering principles that apply to bridges and buildings should apply to IT. That is, security should be built in, not added later.
Rising stars in the cybersecurity field came together at the University of Massachusetts Boston recently to hone their skills.
DHS says it found out about the Heartbleed vulnerability at the same time everyone else did. But unlike most other organizations, it had to wade through layers of legal negotiations before it could help federal agencies fix the cyber vulnerability in their own systems.
The agency that runs federal employees' (401)k-style Thrift Savings Plan needs to do a better job monitoring potential cyber incidents against its website, strengthen security at its data centers and come up with a plan for tracking all of its technology hardware. That's according to recent audits of the TSP program undertaken by the Labor Department, which were presented to the Federal Retirement Thrift Investment Board Monday.
Financial advisor Arthur Stein will answer your calls and emails about the TSP. Also, Andy Medici and Amber Corrin of the Federal Times will discuss, among other things, Public Service Recognition Week and the recently passed DATA Act.
April 30, 2014
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities. GSA and SBA continue their ongoing quarrel over the Office Supplies 3 contract, and April marks the three-year anniversary of NSTIC's release.