Cybersecurity

  • The Obama administration already has made clear that it will request a budget Monday which violates the automatic spending caps in existing law. But for DoD, the war accounts, which are exempt from the caps, may serve as a backup plan.

    February 02, 2015
  • Evan Lesser, founder and director for ClearanceJobs.com, will discuss the state of hiring in the clear community in 2015. January 30, 2015

    January 30, 2015
  • Pentagon CIO sees renewed vigor in DoD's cloud migration path as an opportunity to raise the bar for the nation's overall cybersecurity, telling vendors he wants a much closer partnership with commercial cloud providers.

    January 30, 2015
  • Bobbie Stempfley is heading to the private sector after five years at the Homeland Security Department. She worked in a variety of senior executive cyber positions.

    January 29, 2015
  • The Pentagon led the way for the rest of the government by implementing two-factor authentication across many of its systems. But plenty of important IT infrastructure still relies on a "reckless" system that depends on passwords alone for authentication.

    January 28, 2015
  • The Veterans Affairs Department's computers and networks get a clean bill of health from third-party experts. The analysis comes about a year and a half after the VA came under intense scrutiny at a House Veterans Affairs Committee hearing for having major cybersecurity vulnerabilities. Federal News Radio Executive Editor Jason Miller tells In Depth with Francis Rose about the report and what it means for veterans' data.

    January 27, 2015
  • Mark Orndorff, risk management executive & chief information officer for the Defense Information Systems Agency, joins Federal News Radio for a free online chat to discuss his agency's new risk management organization and DoD's evolving approach to cybersecurity.

    January 27, 2015
  • A new Pentagon report shows a troubling proportion of DoD's IT systems appears to be vulnerable to low- or intermediate-level hackers, leaving aside the advanced persistent threats everyone's worried about.

    January 26, 2015
  • Mandiant issued a report finding the Veterans Affairs Department network domain controllers had no evidence of data theft, such as the loss of credentials, personal information or personal health information or VA sensitive information. But some congressional sources are skeptical of Mandiant's findings, calling it too narrow to be sure the network and veterans data is safe.

    January 26, 2015
  • The Defense Information Services Agency has reorganized its services to be more customer focus and have accountability over what technology they provide.

    January 23, 2015
  • Cybersecurity for the intelligence community has become what terrorism was in the early 2000s — an all encompassing priority. It's such a big priority that Michael Vickers, the undersecretary of defense for intelligence, is making cybersecurity transformation the hallmark of his tenure. Federal News Radio Executive Editor Jason Miller tells In Depth with Francis Rose how Undersecretary Vickers is trying to take on the cybersecurity challenge.

    January 22, 2015
  • By RICARDO ALONSO-ZALDIVAR and JACK GILLUM Associated Press WASHINGTON (AP) — The government’s health insurance website is quietly sending consumers’ personal data to private companies that specialize in advertising and analyzing Internet data for performance…

    January 22, 2015
  • Michael Vickers, the undersecretary of Defense for intelligence, said cybersecurity and terrorism are his top two short- and long-term concerns. He said protecting space-based systems is becoming more important than ever. Vickers also wants to continue to transform the military intelligence community to meet ever-changing threats.

    January 22, 2015
  • The hackers that went after Sony wanted the company to know it was under attack and they wanted to do it harm, says Rob Roy of HP Enterprise Security Products. In a new commentary, Roy says the attack was a watershed moment in cybersecurity, marking a change in attackers' motives.

    January 22, 2015