Insider Threat programs across all agencies must develop alongside technology, the GAO reports. However, the Department of Defense is making significant progress.
The Defense Information Systems Agency is hard at work on the next generation of mobile, secure computing for the Defense Department. And it’s up to some heavy contracting activity.
If you’ve got kids or grandchildren and you’ve got a phone, Senior Correspondent Mike Causey says you may also have a bull’s-eye painted on your purse or wallet.
Camron Gorguinpour, principal at Woden, joins host John Gilroy on this week’s Federal Tech Talk to discuss innovation, open systems architecture and how his company helps organizations gain a new perspective on diversity and defense acquisition. June 27, 2017
Federal agencies trying to fend of the cybersecurity threat are about as not always effective, as breaches and losses are common. In fact, according to research by Thales E-Security and 451 Research, one third of agencies experienced a data breach just in the last year. Wayne Lewandowski, vice president of federal at Thales, joined Federal Drive with Tom Temin to discuss the numbers.
The Veterans Affairs Department’s inspector general said in its annual Federal Information Security Management Act (FISMA) report that the agency’s cybersecurity efforts remain troublesome and puts data and systems at risk.
Allan Liska, threat intelligence analyst at Recorded Future, joins host Derrick Dortch on this week’s Fed Access to discuss the rise in ransomware attacks around the world, and what you can do to protect your company or agency from these threats. June 23, 2017
Greg Hall, the assistant director and chief information security officer in the Executive Office for U.S. Attorneys in the Justice Department, said the office hired Okta to provide a cloud service to federate its identity management capabilities.
As the continuous diagnostics and mitigation program enters its fourth year, the Homeland Security Department is considering how it can utilize the cloud for both agency and federal dashboards. DHS is expected the launch the federal dashboard later this summer.
The Insider Threat Task Force was created by the Obama administration to uncover, analyze and thwart the risk of insider threat in government agencies.
A House panel wants the Defense Department to notify Congress when cyber attacks are made and new cyber weapons are developed. It also wants to be notified of counterterrorism policy changes.
J. Kevin Reid, vice president of national security and CIO for KeyLogic Systems, makes the case why the NIST cybersecurity framework gives everyone a basis to start in the same place when talking about protecting systems and networks.
Defense information pro Paul DeMennato offers advice about protecting informational systems against insider threats. He said it’s more than keeping up to date on patches and monitoring files for human anomalies, it’s about getting your staff to buy in to a culture of protecting against insider attacks.
The White House kicked off tech week by hosting 18 private sector technology leaders from companies such as Amazon, Apple and Google at the American Technology Council meeting.
The Defense Department is taking a new look at the rules it applies to contracts with commercial cloud computing providers. The Pentagon’s acting CIO wants staff to examine whether vendors’ own security controls could replace DoD’s requirement for government-operated cloud access points.