Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: cybersecurity
The Homeland Security Department alerted employees in its headquarters office, and its Customs and Border Protection and Immigration and Customs Enforcement components that a vendor processing background investigations may have exposed personal data. DHS emphasizes there is no evidence of any lost or stolen information.
HHS approves Amazon Web Services for meeting security requirements under the Federal Risk Authorization Management Program. The company's secure documents are available for other agencies to review to help accelerate their move to the cloud.
The Defense Information Security Agency has approved a security guide for iOS 6 making it the third mobile operating system to meet the requirements this month. The agency said it will award a mobile device management system in a few months.
On this week's Capital Impact show, Bloomberg Government analysts discuss the cyber attack on Federal News Radio and WTOP, and the future of crowdfunding.
May 16, 2013
The company says both sites have been scrubbed of malware and vulnerabilities have been closed. The "drive-by" attack that affected the sites is a growing type of cyber hack that looks for holes in popular websites. FederalNewsRadio.com and WTOP.com are available again to users of all Internet browsers.
Seven people were arrested in the U.S., accused of operating the New York cell of what prosecutors said was a network that carried out thefts at ATMs in 27 countries from Canada to Russia.
Out of an abundance of caution, Federal News Radio is continuing to block access to FederalNewsRadio.com via the Internet Explorer browser.
Three Department of Homeland Security components are testing how ongoing authorizations work. The Office of Management and Budget is drafting a memo to require agencies to change from approving the cybersecurity of systems every three years to a more regular oversight schedule.
Tags: technology , DHS , Jeff Eisensmith , OMB , Coast Guard , Mark Powell , Larry DeNayer , Citizenship and Immigration Services , continuous monitoring , ongoing authorizations , ACT-IAC , Jason Miller
The Pentagon's mobile plan includes device approvals that will involve some up-front costs. The expectation is those costs will be quickly offset by eliminating the inefficiency of the slow, stovepiped and outdated approaches that have characterized DoD mobility up until now.
On the one-year anniversary of the Digital Government Strategy, the CIO Council and DHS are expected to issue a security baseline and reference architecture for mobile computing. The goal of the document is not to give agencies new requirements but to focus on those security standards that are mobile-centric.
Tags: technology , TechAmerica , CIO survey , Simon Szykman , Commerce , Kevin Cox , CIO Council , Brian Teeple , DoD , mobile computing , George DelPrete , Grant Thornton , Daren Ash , NRC , Jason Miller