Special Bulletin Review: Securing our Citizens while Modernizing

  • As the Office of Personnel Management data breach recedes into the past, the 30-day cyber sprint has left a lasting legacy, says Federal Drive host Tom Temin.

    August 26, 2015
  • The Coast Guard is seeing many of its projects growing into programs of record with acquisition plans and contracts that are both on schedule and on budget thanks to a new strategy.

    August 25, 2015
  • Agencies had a huge hole to dig out of when the 30-day cyber sprint began in June. That's according to an internal document obtained by Federal News Radio. The state of federal cybersecurity was worse than many might have thought. In this week's edition of "Inside the Reporter’s Notebook," executive editor Jason Miller writes about how far agencies had to come over the summer. He joined the Federal Drive with Tom Temin to share the exclusive details.

    August 24, 2015
  • The time to move from contract award to full implementation under the continuous diagnostics and mitigation (CDM) program will force agencies to decide whether to spend money on new tools or wait for those coming from DHS.

    August 24, 2015
  • A new document obtained by Federal News Radio shows just how bad in shape agencies were in terms of cybersecurity as of June, and just how far they came over the summer.

    August 21, 2015
  • While its known as a marketplace for contraband and subculture activity, network defenders have found that movement in the dark web can help predict potential hacks and breaches.

    August 21, 2015
  • Job one for federal agency tech staffs these days can be summed up in one word: Cybersecurity. A big part of ensuring safety of data is making sure networks are protected. Leo Taddeo is the chief security officer at Cryptozone, and former FBI Special Agent in charge of the bureau's Special Operations Cyber Division in New York. He joined the Federal Drive with Tom Temin with some advice on best practices for network monitoring and intrusion prevention.

    August 21, 2015
  • The first iteration of the cybersecurity dashboard under the continuous diagnostics and monitoring is supposed to come out later this month. It will soon be one piece of the toolkit agencies can use to step up their cybersecurity game. Molly O'Neill is vice president for state and local government industry at CGI and former chief information officer at the Environmental Protection Agency. She tells In Depth with Francis Rose why the dashboard is the tool agency managers need to understand where they stand on security.

    August 20, 2015
  • The Army plans on requesting proposals for the third iterations of its ITES and ADMC contracts by next January. New proposals will likely tackle target areas such as mobility, cloud integration and cybersecurity, but CHESS wants to make sure small businesses are in the running for contracts.

    August 20, 2015
  • Improving federal cybersecurity is the goal of a new effort that combines input from government and industry leaders. ACT-IAC is collecting responses from agencies, industry and academia on eight major challenges. The responses will go in a report to the Office of Management and Budget late next month. The public comment period closes Aug. 28. Mike Howell, ACT vice president at-large and deputy program manager at the Information Sharing Environment, tells In Depth with Francis Rose about the kinds of ideas he's looking for.

    August 19, 2015
  • The chairman of the House Oversight and Government Reform Committee sent three letters-- one to OPM, one to DHS and one to one of OPM's main technology contractors, Imperatis Corp., seeking answers to a variety of questions.

    August 19, 2015
  • The Office of Personnel Management faces a third lawsuit in the wake of the cybersecurity breach it suffered in June that resulted in 22 million past, present, and potential federal employees having their personal information stolen.

    August 18, 2015
  • COMMENTARY: Ron Gula, the CEO of Tenable Network Security, makes the case for CIOs not to get overwhelmed by all the security rules and requirements and instead to focus on a few areas that can make a big difference.

    August 18, 2015
  • The Office of Management and Budget just released new guidance on protecting non-sensitive information from federal contractors. The guidance would require contractors follow National Institute for Standards and Technology standards for protecting their information.

    August 17, 2015