Cybersecurity

  • Both the Army and Air National Guard say they are making inroads toward gaining a foothold for their state-based forces in the Defense Department's growing mission sets in cyberspace. Both services say they are training more personnel and building the guard's credibility within the Pentagon when it comes to cyber missions.

    September 03, 2014
  • Former GSA official Dave McClure left government in June and now is an executive at the Veris Group.

    September 02, 2014
  • The Environmental Protection Agency can't keep track of the data it stores in the cloud. EPA's Inspector General says it a subcontractor for a water permit system was using a cloud system to run its share of the operation, but neither the agency nor the prime contractor was aware of it. Albert Schmidt is an IT auditor of Information Resources Management and audits for the EPA's Inspector General. He says this type of cybersecurity problem isn't entirely the agency's fault.

    August 28, 2014
  • It seems like the whole world is going mobile, and that includes the federal government. Agencies are using more and more apps for collaboration and productivity. But some apps increase the potential for exposing government data. To help you guard against these security risks, the National Institute of Standards and Technology is providing tips to the federal community for vetting third-party apps. Computer Scientist, Tom Karygiannis, joined Tom Temin on the Federal Drive to discuss the guidelines.

    August 28, 2014
  • Chris LaPoint, vice president of Product Management for SolarWinds will discuss how his company can help your agency manage its information technology system. August 26, 2014

    August 26, 2014
  • Labor Department Deputy CIO Dawn Leaf joins Federal News Radio for an online chat to discuss her priorities around IT modernization, data center consolidation and cybersecurity.

    August 26, 2014
  • The Defense Information Systems Agency will begin to shake up its organizational chart in significant ways beginning on Oct. 1. But officials, so far, are reluctant to discuss the details.

    August 25, 2014
  • New details emerge about the cyber attack against USIS. Hackers accessed personal information of Department of Homeland Security workers, including Social Security numbers, dates of birth and addresses. DHS will offer credit monitoring services to the affected employees.

    August 25, 2014
  • Plans for the 11th annual Cybersecurity Awareness Month are underway at the Department of Homeland Security. DHS will partner up with the National Cyber Security Alliance to offer different events each week catered for federal agencies, individuals, and private companies. Week One will focus on the basics of cybersecurity. Starting in Week Two the topics get a little more specific. You can learn about how to develop more secure IT products, including cloud systems, and in Week Four the theme is cybersecurity for small and medium-sized businesses. DHS and the National Cyber Security Alliance hope the outreach will strengthen and build cybersecurity best practices for both private companies and federal agencies.

    August 21, 2014
  • The Defense Information Systems Agency, which serves as the broker between Defense Department components and commercial providers of cloud computing services, says the certification standards it set for commercial providers may be too arduous for vendors. DoD also launched five pilots to test the use of commercial cloud providers and is reassessing how it develops cloud requirements.

    August 21, 2014
  • The National Security Agency closed down an office dedicated to mobility, because devices and apps have become part of the fabric of everything the agency does. But NSA, like all agencies, still must figure out how to secure mobile devices using derived credentials.

    August 21, 2014
  • Todd Weller of Hexis Cyber discusses the types of security threats federal agencies are facing on this week's Federal Tech Talk radio show.

    August 19, 2014
  • The fast-growing number of devices connected to the Internet means enterprises need to rethink their approaches to cybersecurity. Cyber expert Melissa Hathaway says we're at a cyber inflection point. She's the president of Hathaway Global Strategies and former director of the Joint Interagency Cyber Task Force. She joined Tom Temin on the Federal Drive to discuss the top concerns for cybersecurity.

    August 18, 2014
  • The service will test out a role-based authentication technology on an application in the MilCloud run by DISA. Frank Konieczny, the Air Force's chief technology officer, said the pilot could move into full production in six months. DoD is considering adding the role-based capability to the JIE framework.

    August 15, 2014