Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The Homeland Security Department awarded $14 million for cybersecurity research. The focus will be on several elements of denial-of-service attacks. Dr. Dan Massey, program manager in the Cyber Security Division at DHS' Science and Technology Directorate, explained the denial of service problem to In Depth with Francis Rose and why DHS is putting money behind fighting it.
The Defense Information Systems Agency awarded a $1.8 million contract to Advanced Onion to build websites that help potential hack victims see if they've been affected by the breach.
Tyler Morris, director of product management for Iron Mountain Government Services, offers a path for agencies to consider when preparing for natural or manmade disasters.
The small businesses that serve the Department of Defense may benefit from a program to share the Pentagon's cybersecurity lessons-learned. DoD's Office of Small Business Programs has some opportunities for companies to learn from the department's experience, but there are more ways the agency could share its work. Joseph Kirschbaum, director of Defense Capabilities and Management Issues at the Government Accountability Office, shares his insight on In Depth with Francis Rose.
Rep. Will Hurd (R-Texas) says agencies are moving too slowly to take advantage of cloud computing. Hurd, chairman of the Oversight and Government Reform Subcommittee on IT Operations, held a recent hearing on the state of federal cloud computing. In his weekly feature Inside the Reporter's Notebook executive editor Jason Miller writes about how much progress agencies have made in implementing cloud computing.
There is a growing interest on Capitol Hill to codify some aspects of cloud computing, including the security authorization program known as FedRAMP.
Vice Chief of Naval Operations Adm. Michelle Howard said cyber weapons are following a similar trajectory as nuclear weapons and for now need top command and control authorities to be used.
A rather nasty advanced persistent threat group known as “Naikon” targets governments and commercial interests in South, Southeast Asia and the South China Sea. Now, a team of researchers from two companies, Threat Connect and The Defense Group, has analyzed five years of Naikon activity. They think they've identified the individual behind the malware. Rich Barger is chief intelligence officer at ThreatConnect. He joins the Federal Drive with Tom Temin now with the highlights from Project CameraShy.
Maybe not at the state dinner, but President Obama could put Chinese President Xi Jinping on the defensive with a simple question. “So, how’s Ge Xing these days?” Ge Xing is an obscure officer in…
National Security Agency Director Michael Rogers told lawmakers that NSA needs to be restructured to deal with an ever-changing threat landscape.
If you work or ever worked for the government, if you retired from Uncle Sam, if you applied for but didn't take a federal job, odds are somebody knows a lot of your secrets. Who did it, what exactly did they do, when did it happen, where, and often most elusively, why?
Data protection using encryption won't buy much unless you design it correctly. Like, keeping the keys away from the encrypted data. It's all in NIST publication 800-57. Look it up.
Encryption has been around almost as long as the ability to count. Yet it remains a difficult technology for CIOs to implement. Robert Bigman spent 30 years in the CIA, including 15 as its chief information security officer. Now he's an independent cyber security consultant and president of 2 B Secure. He joins the Federal Drive with Tom Temin with some practical advice for approaching encryption.
The theft of more than 4 million fingerprints is a "black eye" on the face of the Office of Personnel Management, cybersecurity experts say, but it's also a reminder for all agencies and industry to consider the strength of their security access.