Cybersecurity

  • Could we be hacked back in time?

    Looking at real threats in an ether-based world

  • Internal Revenue’s Internal Audit

    How secure are the 98,000 desktop and laptop computers at the Internal Revenue Service? Peggy Begg is the Assistant Inspector General for Security and Information Technology Audits with the Treasury Department. She joins us to…

  • Confickr Worm

    Once again, the world of networked computers held its collective breath last week. Would the Confickr worm morph on April Fool’s Day into real malware? It did not. Why not? Probably for a couple of…

  • Cyber office in White House unlikely?

    Rep. Langevin says OMB may get increased staff instead

  • CISCO On Cybersecurity

    Cybersecurity is constantly evolving. Each year, Cisco taps into some 400 cybersecurity officials across the organization to assess the state of cybersecurity, and they have a new report out on the subject. And there is…

  • Is the Cloud Coming?

    Cloud computing is coming — and that it probably should — that’s the gist of a new report by Marketspace, Envisioning the Cloud: The next computing paradigm. Many agencies are looking at cloud computing, including…

  • File Sharing

    File sharing software. It’s great for trading music and pictures. That’s why millions of people use it. Trouble is, file sharing leaves your entire hard drive open for sharing if someone types in the right…

  • The Marine One Breach

    We’re learning more about how sensitive diagrams of Marine One got into the hands of a computer user in Iran. CNN Washington Correspondent Brian Todd tells us that the defense subcontractor actually took the information…

  • More Money for Cybersecurity

    $355 million. That’s how much President Barack Obama wants for the Homeland Security Department’s cybersecurity budget in 2010. GCN reports that the money would support the department’s role in the Comprehensive National Cybersecurity Initiative, among…

  • CIO Survey Task Force

    Paul Wohlleben Chairman of the CIO Survey Task Force, Grant Thornton March 5, 2009

  • Company discovers security breach involving Marine One

    A company that monitors peer-to-peer file sharing networks has discovered a security breach involving Marine One, according to WTOP Radio.

  • DHS considering giving TSA employees union rights

    Review part of Napolitano’s priorities for department

  • CIOs say cyber, infrastructure top priorities

    New survey details lessons learned from last 8 years

  • New guidelines to close 20 biggest cyber holes

    The guidelines, issued Monday by public and private sector cybersecurity experts, are considered the low-hanging fruit to help agencies improve their network security immediately, says John Gilligan, a former Air Force and Energy Department chief information officer.