Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
At the recent State of the Net conference in Washington, Lior Div, co-founder and CEO of the cybersecurity company Cybereason had advice for how the Trump administration can plug government's many cybersecurity holes. Div shared his insight on Federal Drive with Tom Temin.
IT leaders at the Office of Personnel Management say the agency has one major database left to encrypt, which contains some high-value assets and personally identifiable information for security clearance holders and federal employees.
The Transportation Security Administration has long been working with outdated IT security protocols and equipment. In response, the Homeland Security Inspector General has said the agency is making progress to ensure its IT infrastructure is more stable and secure. Sondra McCauley, DHS assistant Inspector General for IT Audits, explains the updates with Eric White on Federal Drive with Tom Temin.
President Donald Trump decided not to sign a new cybersecurity executive order on Jan. 31, but more specifics of the plan to secure federal and private sector networks emerge.
Maria Horton, CEO of EmeSEc, explains why having a strong cyber incident response plan is critical to your organization’s success.
Cyber experts say the nation’s challenges are well known and another set of reviews, as proposed by the Trump administration, is delaying the real work to fix vulnerabilities and mitigate risks.
Sources confirmed CIOs from State, DHS, EPA and OPM and the CTO from VA talked a variety of issues with the Trump transition team toward the end of Obama administration.
Government contractors are in the dark about what President Donald Trump’s administration has in store, just like everyone else. But government contract lawyers from law firm Crowell and Moring are making some speculations.
The Defense Department is having a particularly tough time integrating mobile technology into its mission, largely because every attempt to link it to the Common-Access-Card has been too cumbersome. But DISA’s Purebred program may have found a way to bypass the CAC altogether.
When Army officials decided to launch the service’s first-ever bug bounty, one of the key questions they wanted to answer was whether sensitive personnel records were vulnerable to theft by hackers via the Army’s public-facing websites. As it turns out, the answer was yes.
Dr. Steve Bennett, director of Global Government Practice at SAS, joins host John Gilroy on this week's Federal Tech Talk to discuss advanced analytics, insider threats, data optimization, cyber analytics and big data. January 24, 2017
Rebekah Lewis, deputy director of American University’s Kogod Cybersecurity Governance Center, joins Jonathan Aberman, host of What’s Working in Washington.
The federal government's approach to cybersecurity personnel isn't serving the interests of better security very well. Hiring from the wrong places and granting certifications no one wants are among those not-so-smart practices. That's the contention of Paul Innella, founder of TDI, a cyber consultancy that's worked for many federal agencies. He offers his insight on Federal Drive with Tom Temin.
Before leaving the Obama administration, Tony Scott, the federal CIO, released a report for the next administration to better understand the past, current and potential future of technology in agencies.