Special Bulletin Review: Securing our Citizens while Modernizing

  • The Homeland Security Department awarded $14 million for cybersecurity research. The focus will be on several elements of denial-of-service attacks. Dr. Dan Massey, program manager in the Cyber Security Division at DHS' Science and Technology Directorate, explained the denial of service problem to In Depth with Francis Rose and why DHS is putting money behind fighting it.

    October 01, 2015
  • The Defense Information Systems Agency awarded a $1.8 million contract to Advanced Onion to build websites that help potential hack victims see if they've been affected by the breach.

    October 01, 2015
  • Tyler Morris, director of product management for Iron Mountain Government Services, offers a path for agencies to consider when preparing for natural or manmade disasters.

    September 29, 2015
  • The small businesses that serve the Department of Defense may benefit from a program to share the Pentagon's cybersecurity lessons-learned. DoD's Office of Small Business Programs has some opportunities for companies to learn from the department's experience, but there are more ways the agency could share its work. Joseph Kirschbaum, director of Defense Capabilities and Management Issues at the Government Accountability Office, shares his insight on In Depth with Francis Rose.

    September 28, 2015
  • Rep. Will Hurd (R-Texas) says agencies are moving too slowly to take advantage of cloud computing. Hurd, chairman of the Oversight and Government Reform Subcommittee on IT Operations, held a recent hearing on the state of federal cloud computing. In his weekly feature Inside the Reporter's Notebook executive editor Jason Miller writes about how much progress agencies have made in implementing cloud computing.

    September 28, 2015
  • There is a growing interest on Capitol Hill to codify some aspects of cloud computing, including the security authorization program known as FedRAMP.

    September 28, 2015
  • Vice Chief of Naval Operations Adm. Michelle Howard said cyber weapons are following a similar trajectory as nuclear weapons and for now need top command and control authorities to be used.

    September 25, 2015
  • A rather nasty advanced persistent threat group known as “Naikon” targets governments and commercial interests in South, Southeast Asia and the South China Sea. Now, a team of researchers from two companies, Threat Connect and The Defense Group, has analyzed five years of Naikon activity. They think they've identified the individual behind the malware. Rich Barger is chief intelligence officer at ThreatConnect. He joins the Federal Drive with Tom Temin now with the highlights from Project CameraShy.

    September 25, 2015
  • Maybe not at the state dinner, but President Obama could put Chinese President Xi Jinping on the defensive with a simple question. “So, how’s Ge Xing these days?” Ge Xing is an obscure officer in…

    September 25, 2015
  • National Security Agency Director Michael Rogers told lawmakers that NSA needs to be restructured to deal with an ever-changing threat landscape.

    September 25, 2015
  • If you work or ever worked for the government, if you retired from Uncle Sam, if you applied for but didn't take a federal job, odds are somebody knows a lot of your secrets. Who did it, what exactly did they do, when did it happen, where, and often most elusively, why?

    September 25, 2015
  • Data protection using encryption won't buy much unless you design it correctly. Like, keeping the keys away from the encrypted data. It's all in NIST publication 800-57. Look it up.

    September 24, 2015
  • Encryption has been around almost as long as the ability to count. Yet it remains a difficult technology for CIOs to implement. Robert Bigman spent 30 years in the CIA, including 15 as its chief information security officer. Now he's an independent cyber security consultant and president of 2 B Secure. He joins the Federal Drive with Tom Temin with some practical advice for approaching encryption.

    September 24, 2015
  • The theft of more than 4 million fingerprints is a "black eye" on the face of the Office of Personnel Management, cybersecurity experts say, but it's also a reminder for all agencies and industry to consider the strength of their security access.

    September 24, 2015