Air Force cybersecurity officials worry that the rank-and-file may be too preoccupied with the nuts and bolts of compliance.
Educational opportunity is the most important motivation government can use to attract cybersecurity talent, even more than pay or mission.
Whether you’re a federal agency or a contractor, cybersecurity has become too important to leave solely to the tech staff. The worst threat these days seems to be the insider threat. Addie Cliffe and Evan Wolff, attorneys with the privacy and cyberscurity group at Crowell Moring, joined Federal Drive with Tom Temin to offer advice on how to take a corporate approach.
Rick Howard, the chief security officer for Palo Alto Networks, said the cybersecurity consumption model will be disrupted by orchestration and automation in the cloud.
Pentagon cybersecurity officials say two global ransomware attacks highlighted improvements the Defense Department has made to its ability to command and control its own networks, but also showed areas that are ripe for improvement.
Jeff Wichman, the practice director for enterprise incident management at Optiv, says the government is doing a “bang up job if effectively responding to cybersecurity incidents.
With the increasingly frequent and diverse nature of cyber attacks, organizations including federal agencies have put a lot of effort into advanced detecting and deeper understanding these threats. “Now,” says Ian Doyle, executive security advisor at IBM Federal, “we’re really seeing the pendulum swing to more response actions.”
Before the Obama administration left office in December, it left a series of reports for the incoming Trump administration.
In today’s Federal Newscast, a report issued by the Defense Department inspector general has found 350 known security vulnerabilities at three Army hospitals and clinics, adding Defense Heath Agency and Army officials have failed to effectively protect electronic patient health information.
In today’s Federal Newscast, the Information Technology and Innovation Foundation has proposed a detailed set of recommendations for the White House to boost faith in the legitimacy of government by improving its effectiveness.
Peter Tran, the general manager and senior director for worldwide advanced cyber defense practice at RSA, takes what he calls an edgier view of cybersecurity than the average cat.
Near-weekly, worldwide cybersecurity threats underscore the importance of network, end-point, and application monitoring. Federal agencies have worked under a policy of continuous monitoring/continuous diagnostics and mitigation for a decade. But given the seemingly unending growth in attack vectors, the spread of internal infrastructure to commercial cloud providers, and the rise of insider threats – they’ve got to up the game into what might be called advanced cyber monitoring.
The Defense Department has started testing one potential technology to replace the Common Access Card. This one purports to identify users by the ways in which they manipulate their mouse and type on their keyboards.
For this week’s Extra episode, What’s Working in Washington sat down with three of the area’s top experts on cybersecurity and hacking to see what needs to be done to protect your business. Andres Franzetti,…
Who is actually responsible for that cyber attack that hit your organization? Often it comes down to guess work. Few people have much faith in the accuracy of the attribution. So what to do? John Davis II, senior information scientist at the Rand Corporation and co-director for scalable computing and analysis, joined Federal Drive with Tom Temin with recommendations.