Cybersecurity

  • The U.S. Computer Emergency Readiness Team will begin using two emerging technical specifications to automate how cyber threat information is shared with the public and private sectors.

    May 21, 2015
  • Inspectors general would have the power to subpoena former feds and contractors to testify in cases of fraud or waste of more than $100,000, or when criminal activity is suspected.

    May 19, 2015
  • Despite significant investments in cybersecurity, the government\'s current state of readiness leaves a lot to be desired. That\'s according to security managers themselves, responding to the latest survey from ISC2. Dan Waddell, director of government affairs for the National Capital Region of ISC2, joined Tom Temin on the Federal Drive with more on the Global Information Security Workforce Study.

    May 19, 2015
  • Is patience running short among agencies over the Homeland Security Department\'s continuous diagnostics and mitigation (CDM) program?

    May 18, 2015
  • Defense Secretary Ash Carter looks to Silicon Valley for help with its new cyber strategy. But Carter doesn\'t have too much time to get the partnership off the ground before the Obama administration leaves and another one takes its place. Steve Grundman, George Lund fellow at the Atlantic Council and former deputy defense undersecretary for industrial affairs and installations, tells In Depth with Francis Rose why Carter should focus on the wins he can earn now.

    May 15, 2015
  • The National Institute of Standards and Technology is bringing these concepts together in a new document to help improve cyber defense and resilience. Ron Ross, a fellow at NIST, said moving cybersecurity closer to the mission decision-makers will help solve a fundamental flaw in how agencies protect systems and data.

    May 14, 2015
  • Emile Monette, senior advisor for Resilience and Cybersecurity at the General Services Administration, joins host John Gilroy to discuss how to make the acquisition process safer and more effective. May 12, 2015

    May 12, 2015
  • The Chief Information Officer\'s Council held a séance, pulled out its Ouji board and asked for the approval from Rip Van Winkle to raise the United States Government Configuration Baseline (USGCB), otherwise known as the Federal Desktop Core Configuration, from its long slumber.

    May 11, 2015
  • The Senate\'s top two members on homeland security want to know why more isn\'t being done to stop another cyber attack on federal retirement accounts.

    May 08, 2015
  • The Veterans Affairs Department will finalize a strategy to determine how to use public or commercial cloud computing services. VA backed away from public or commercial clouds about three or four years ago because of concerns over records retention capabilities.

    May 08, 2015
  • New plan charts the Navy\'s strategic objectives in cyber over the next five years, with 18-month measures of progress along the way.

    May 07, 2015
  • The Coast Guard unveiled a new cybersecurity strategy earlier this month. It doesn\'t just focus on protecting Coast Guard networks and systems. It also includes the country\'s 3,600 ports. That\'s because so many ports are nearly fully automated, and therefore vulnerable to cyber attacks. Capt. Andrew Tucci is the chief of the Coast Guard\'s Office of Port and Facility Compliance. On the Federal Drive with Tom Temin, he said cyber attacks comprise the fastest growing risk, even at the ports.

    May 05, 2015
  • On Monday, the Pentagon made good on its promise to make more use of the government\'s FedRAMP process, certifying 23 cloud products as secure enough to host DoD low-level data.

    May 05, 2015
  • Chris Cullison and CW Walker from ZeroFOX, join host Derrick Dortch to discuss how hackers and terrorists are using social media to further their agendas. May 1, 2015

    May 01, 2015