Gen. Bill Lord said the community transformation plan focuses on \"delivering warfighting effects while protecting an interconnected and interoperable domain.\"
The Army is in the middle of a major rethink of mobile devices, including how it secures them, how it buys them and ultimately, how it uses them. The push comes amid a mandate to find $1.5 billion in IT savings across the Army.
Warren Linscott, vice president at Deltek, tells The Federal Drive with Tom Temin what areas of growth are out there for federal contractors.
The White House is calling for feedback on \"moving target\" techniques for cybersecurity.
Code written to test a hole in software from Microsoft escaped into the hands of hackers.
The Health and Human Service Department has settled for a $1.5 million fine on Blue Cross Blue Shield of Tennessee, stemming from a 2009 identity theft case.
The Defense Advanced Research Projects Agency is switching to offense on the cyber field. DARPA Director Regina Dugan said new research will address military-specific ways to actually create cyber threats, not just develop ways to defend against them.
Cyber attacks against federal websites and networks went up only 5 percent between 2010 and 2011.
Call for papers aims at developing protection for federal technology systems against cyber attacks.
The administration now will release a digital services strategy in April instead of just one for mobile computing. The document will bring together two efforts, mobile and .gov reform. Agencies are trying to avoid mistakes made when they entered the PC-era by ensuring a mission need for these devices.
Agency CIO Robert Osborn is improving the network and cybersecurity. He said the cloud of clouds approach gives the National Nuclear Security Administration the security and flexibility they need to meet their mission. March 15, 2012
One of the newest threats involves a phishing attack. A phony email that appears to be from IRS tells recipients that they will be fined up to $10,000 for failing to file their tax return on time.
Lawmakers weigh public\'s right to know against the need to protect cyber secrets. Sen. Patrick Leahy\'s (D-Vt.) provision in 2012 Defense authorization bill tightens the definition of \"exemptions,\" but he questions the need for further rules to give agencies power to withhold information.
The top lawyer for U.S. Cyber Command, Air Force Col. Gary Brown, calls the Stuxnet attack the model of a responsibly conducted cyber attack. Catherine Lotrionte, the executive director of George Washington University\'s Institute for Law, Science and Global Security joined In Depth with Francis Rose to discuss Stuxnet.
Hord Tipton, the executive director of ISC2 and the former chief information officer at the Interior Department, joined In Depth with Francis Rose to discuss the \"red flags\" managers should look for in the hiring process.