Cybersecurity

  • The Defense Information Systems Agency says an eventual commercial cloud buy probably won't be bundled into a single contract vehicle, but in the meantime, DoD needs to work through challenges involving security, approval policy and network operations.

    January 22, 2014
  • How can you tell if your system has been compromised? Internet security firm Mandiant says there are numerous signs. Included are evidence of unauthorized use of valid accounts, trace evidence & partial files, command and control activity, known and unknown malware, suspicious network traffic, valid programs used for other purposes and files that have obviously been accessed by attackers. IT managers are reminded that threats can slip in undetected and lay dormant for long periods of time before striking.

    January 21, 2014
  • How do you shop securely online. The Center for Internet Security says you should "know your online merchants. Limit online shopping to merchants you know and trust. Only go to sites by directly typing the URL in the address bar. If you are unsure about a merchant, check with the Better Business Bureau or the Federal Trade Commission to ensure its legitimacy. Confirm the online seller's contact information in case you have questions or problems. Use a credit card, not a debit card. Credit cards are protected by the Fair Credit Billing Act and may reduce your liability if your information is used improperly.

    January 21, 2014
  • Devices such as smartphones and tablets are being used more and more often for online shopping and the Center for Internet Security is warning that means the volume of attacks against them will increase as well. The "center" says every time you download an app, you open yourself to potential vulnerabilities. Their advice is to research those apps you plan to download to verify their legitimacy. Update all apps when notified and disable Bluetooth and Near Field Communications when not in use to reduce the risk of your data, such as a credit card number, being intercepted by a nearby device.

    January 21, 2014
  • Recently several large U.S. companies were hacked online and like other victims of similar attacks, they were not aware until well after the attack happened. In some cases it was months. Online security firm Mandiant says, often attacks are blamed on malware, but they say 46% of compromised machines have no malware on them. Mandiant says hackers can navigate through conventional safeguards easily leaving little or no trace.

    January 21, 2014
  • Senate lawmakers won out over the debate about whether or not to merge the E-Government Fund with the Federal Citizen Services Fund. DHS also receives $166 million for cybersecurity programs in the fiscal 2014 spending bill.

    January 21, 2014
  • GSA made the first set of awards under the continuous diagnostics and mitigation (CDM) contract.

    January 17, 2014
  • The White House and the Information Sharing Environment released the Strategic Implementation Plan for the President's National Strategy for Information Sharing and Safeguarding. The plan details 16 initiatives that span federal, state, local and tribal governments as well as private sector and international partners. January 16, 2014

    January 16, 2014
  • Federal News Radio Executive Editor Jason Miller joins host Mark Amtower to talk about a number of Federal IT issues. January 13, 2014

    January 13, 2014
  • With so much gloom and doom about Cyber vulnerabilities, the Rand Corporation has some good news. In his book Cyberdeterrence and Cyber war, Martin Libicki puts it into perspective --suggesting Cyberspace has its own laws; for instance, it is easy to hide identities and difficult to predict or even understand battle damage, and attacks deplete themselves quickly. But the overall message is… cyber war is nothing so much as the manipulation of ambiguity.

    January 13, 2014
  • What's the best thing you can do for your computer? Make sure that it's secure. Kaspersky Lab says you should don't invite bugs and malware in by allowing your computer systems to become outdated. The security company urges you to install operating system and application updates as soon as they're available. It also suggests using your software's built-in systems, and don't ignore the prompts they give you to update your computer security.

    January 13, 2014
  • The Government Accountability Office in a recent report found the requirement for agencies to report data breaches to the Homeland Security Department within one hour of discovering the incident is of little value.

    January 09, 2014
  • The Syrian Electronic Army (SEA) said hacked into Skype's social media accounts last week. Now the Internet calling service confirms it had been hit with a "cyber-attack" but said no user information was compromised. SEA posted a tweet posted on Skype's official Twitter feed that read: "Don't use Microsoft emails (hotmail, outlook). They are monitoring your accounts and selling the data to the governments. More details soon. #SEA"

    January 06, 2014
  • Mandiant, the Virginia-based cyber-security firm than pinpointed a hacking unit in Shanghai that experts believe is part of the Chinese Army's cyber command has been sold. FireEye said that the purchase of privately held Mandiant would increase its ability to stop attacks in their early stages. The company valued the deal at nearly $1 billion.

    January 06, 2014