The Defense Department is taking a new look at the rules it applies to contracts with commercial cloud computing providers. The Pentagon’s acting CIO wants staff to examine whether vendors’ own security controls could replace DoD’s requirement for government-operated cloud access points.
The Defense Department’s acting chief information officer says final rules for the new Cyber Excepted Service should be in effect by July or August.
Industry and government both agree, without qualified people, America remains at risk in the cybersecurity wars. Rodney Peterson, director of the National Initiative on Cyber Security Education, joined Federal Drive with Tom Temin to discuss his team’s efforts
As the cybersecurity challenge has morphed into a multi-front battle – from the insider in the next cubicle to a distant but malevolent foreign power – chief information security officers, network operations and security operations center staffs have steadily acquired a variety of tools to counter the threats. Few federal agencies are operating with an abundance of resources, even for such a high priority activity as cybersecurity.
Bipartisan legislation would require DoD to disclose cyber operations, capabilities to Congress. Advocates say it brings notification requirements in line with what’s required for more traditional military operations.
It was presidentially ordered after the Edward Snowden affair. It’s chaired by the director of national intelligence and the attorney general. But the National Insider Threat Task Force has information, training programs and policy guidance useful to all agencies dealing with cybersecurity vulnerabilities posed by insiders. The Federal Drive with Tom Temin discussed the task force and its work with co-director Wayne Belk.
The same way playing identical notes can sound different from one musician to the next because of personal style, new technology can spot the pacing and patterns of our typing — the newest tool in fighting cyber hacking and identity theft.
In the wake of a major cybersecurity incident last week, federal information technology officials on Wednesday said the balancing act between cyber hygiene compliance and workforce morale remains an ongoing problem.
The government operates a panoply of operating systems on its end points and servers. Never mind Windows 7. You can still find XP, Vista and Windows Server 2003.
The new administration has promised to focus on cybersecurity and artificial intelligence and will be looking to the Washington, D.C. region for new breakthroughs in technology. Chuck Brooks, Vice President of Government Relations & Marketing at Sutherland Government Solutions, says the region should pounce on the opportunity.
Now that it’s Public Service Recognition Week, how about thanking the people in your agency or company that toil to keep your networks running and your data safe?
The House Oversight and Government Reform Committee scolded the Internal Revenue Service and the Department of Education on Wednesday for not sounding the alarm sooner on a major cyber incident that may have compromised sensitive financial information on more than 100,00 taxpayers who applied for federal student financial aid.
The Trump administration’s first 100 days concludes with several policy initiatives and agreeing to a budget plan to avoid a government shutdown.
The Food and Drug Administration is saving time on cyber incident responses by integrating its watch desk and engineers within a single command center, and integrating its tools to provide more holistic views of its systems.
The General Services Administration’s Federal Acquisition Service just created the Highly Adaptive Cybersecurity Services Special Item Number (HACSSIN) to add cyber services to GSA’s Schedule 70 to help agencies procure cyber solutions.