Congressman also adds that he would like to know more about authority of new cybersecurity official.
We’ve been telling you about the White House report on cyberspace policy and the cyber security review. The report was based on that 60-day top-to-bottom review of cybersecurity and was conducted by the National Security…
The Air Force once again is leading the federal effort to address some obvious cybersecurity gaps. The service and Microsoft teamed up to develop secure server configurations for Windows servers. This work comes about two…
The Homeland Security Department’s Science and Technology Directorate is playing matchmaker between systems integrators and up-and-coming companies. The goal is to get cutting-edge cybersecurity technology into the government as quickly as possible. This is part…
The House Oversight and Government Reform Committee will add its two cents to the growing number of bills addressing federal cybersecurity. Lawmakers at a hearing today offered a glimpse of what the new bill could…
When they talk, people listen. That’s the result of a survey of federal chief information security officers. The survey was conducted by (ISC)2 and CISCO and Government Futures. We talk about the survey with (ISC)2…
When an employee keeps passwords on a sticky note attached to his computer screen, that could be a sign that your agency needs a better password policy.
CIO Council offers advice on improving agency input on IT security
As early as this Friday, President Obama is expected to receive a the results of a top-to-bottom review of the nation’s cybersecurity program. The president ordered the review 60 days ago and is expected to…
Survey finds bigger cybersecurity lapses at smaller agencies.
Employees may be one of the real risks to cybersecurity in your organization. A survey by Applied Research and Symantec shows that human error and deliberate sabotage cause large amounts of data to be lost…
The National Institutes of Standards and Technology is updating a nearly four-year-old publication that guides how agencies protect their computer networks. NIST is trying to help agencies battle the changing nature of the cyber threat…
How secure are the 98,000 desktop and laptop computers at the Internal Revenue Service? Peggy Begg is the Assistant Inspector General for Security and Information Technology Audits with the Treasury Department. She joins us to…
Once again, the world of networked computers held its collective breath last week. Would the Confickr worm morph on April Fool’s Day into real malware? It did not. Why not? Probably for a couple of…