Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Clark Campbell, the vice president for public sector for BDNA, argues that if agencies don’t address end of life technology, the next cyber attack could be much worse.
Dave Mihelcic, federal chief technology and strategy officer for Juniper Networks, discusses innovation, information assurance, security, integration and how his company can help agencies move to the cloud. July 11, 2017
John Chirhart, the federal technical director of Tenable, argues for a fundamental change in the way agencies approach cybersecurity for the long-term.
It seems like big-time cyber attacks are getting worse and more frequent. The federal government seems to have avoided the most recent ones. Vince Crisler, CEO of Dark Cubed, tells Federal Drive with Tom Temin how federal managers can keep their organizations safe.
Near-weekly, worldwide cybersecurity threats underscore the importance of network, end-point, and application monitoring. Federal agencies have worked under a policy of continuous monitoring/continuous diagnostics and mitigation for a decade. But given the seemingly unending growth in attack vectors, the spread of internal infrastructure to commercial cloud providers, and the rise of insider threats – they’ve got to up the game into what might be called advanced cyber monitoring.
The Defense Department has started testing one potential technology to replace the Common Access Card. This one purports to identify users by the ways in which they manipulate their mouse and type on their keyboards.
The Office of Management and Budget is writing a new consolidated policy on identity management. The forthcoming guidance is designed to give agencies one place to view OMB's collection of identity management policies and lessons learned over the past several years.
Who is actually responsible for that cyber attack that hit your organization? Often it comes down to guess work. Few people have much faith in the accuracy of the attribution. So what to do? John Davis II, senior information scientist at the Rand Corporation and co-director for scalable computing and analysis, joined Federal Drive with Tom Temin with recommendations.
Jeanette Manfra, the acting deputy undersecretary for cybersecurity at the Homeland Security Department, offered an in-depth look into the steps DHS and the government took to keep federal agencies safe from WannaCry.
Despite all expectations, total average compensation for employees with security clearances has actually slightly declined, dropping 1.27 percent, since 2014.
Insider Threat programs across all agencies must develop alongside technology, the GAO reports. However, the Department of Defense is making significant progress.
The Defense Information Systems Agency is hard at work on the next generation of mobile, secure computing for the Defense Department. And it's up to some heavy contracting activity.
If you've got kids or grandchildren and you’ve got a phone, Senior Correspondent Mike Causey says you may also have a bull's-eye painted on your purse or wallet.
Camron Gorguinpour, principal at Woden, joins host John Gilroy on this week's Federal Tech Talk to discuss innovation, open systems architecture and how his company helps organizations gain a new perspective on diversity and defense acquisition. June 27, 2017