Cybersecurity

  • The New York Times reports the efforts, code name "Olympic Games", began during the Bush administration and one of the strings of code that accidentally became public became known as Stuxnet.

    June 01, 2012
  • A group called the Virginia Tech Intelligence and Defense Executive Alumni, or VT-IDEA, will hold an exhibition of new technology later this month. It's already seen commercialization of remote smartphone wiping technology.

    June 01, 2012
  • The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.

    June 01, 2012
  • CIO Lt. Gen. Susan Lawrence said better systems at posts, camps and stations will let soldiers train on the same equipment as they use in the field. The move to the cloud, data center consolidation and enterprise email are pushing the Army toward a data-centric approach. May 31, 2012

    May 31, 2012
  • One senator is questioning why it took nine months for the Thrift Savings Plan board to find out about a sophisticated cyber attack that compromised 123,000 TSP participants' accounts. Sen. Susan Collins (R-Maine) also wants to know why Congress wasn't informed of the breach until more than a month after it was reported to the board.

    May 31, 2012
  • Federal Technology Analyst Jason Wilson sizes up the defense cyber market. Defense Financial Analyst Sopen Shah looks at potential targets for mergers and acquisitions. Data Analyst Peter Brusoe looks at how federal contractors are donating money this campaign season.

    May 31, 2012
  • The Industry Botnet Group — coordinated by the White House Cybersecurity Office and the Departments of Commerce and Homeland Security — has posted nine principles, including coordination of cyber responsibilities across sectors and reporting lessons learned.

    May 30, 2012
  • In an exclusive interview with Federal News Radio, White House Cyber Czar Howard Schmidt said a majority of the senior leaders in government understand the importance of securing agency, contractor and critical infrastructure systems. He said among his office's biggest accomplishments is moving the day-to-day cyber authority of federal civilian networks to DHS. Michael Daniel will replace Schmidt, whose last day is in early June.

    May 30, 2012
  • Andy Ozment returns to work with new cyber coordinator Michael Daniel. Ozment worked at DHS for the last year as director for compliance and technology.

    May 29, 2012
  • Ma Xiaotian, deputy chief of the general staff of the People's Liberation Army, said the cybersecurity issue is creeping from the virtual world into the real world.

    May 29, 2012
  • Jason Wilson, a reporter for Bloomberg Government, examined federal defense spending on cybersecurity for a new Bloomberg study. He joined In Depth with Francis Rose to discuss the overall trends he's noticed.

    May 25, 2012
  • A sophisticated cyber attack against the Thrift Savings Plan contractor responsible for maintaining the agency's data centers compromised the information of 123,000 TSP participants. However, there is no indication the data has been misused, according to the Federal Retirement Thrift Investment Board. There is also no indication that the TSP's network or its website were affected.

    May 25, 2012
  • A Heritage Foundation report said of all the cybersecurity bills before Congress right now, the most important issue is the government would regulate activities in both the public and private sector.

    May 25, 2012
  • The Financial Management Service moved many of its day-to-day IT operations to the Bureau of Public Debt. FMS is providing oversight and guidance for IT systems in return. John Kopec, FMS's chief information officer, said his next set of priorities is to use business intelligence and analytics tools on the data from the shared service providers. May 24, 2012

    May 24, 2012