Army Research Lab is partnering with universities and scientists to explore the psychology behind cybersecurity.
In a message to senior executives, Secretary Eric Shinseki said that Stephen Warren now will hold the title of executive in charge, Office of Information and Technology and chief information officer. The title change comes as the House Veterans Affairs Committee is turning up on the heat once again on the agency's ability to secure its systems and protect data.
The Defense Information Systems Agency took two big steps toward consolidation of information technology infrastructure before the government shutdown in October. Data centers in Dayton, Ohio, and Chambersburg, Pa., were closed on the first of the month. Functions at those centers were moved to other Defense Enterprise Computing Centers (DECCs).
Lockheed Martin's Cyber Security Alliance is adding three members. Red Hat, Fire Eye, and Splunk will join the consortium to "help create intelligence-driven defense products," at the company's NexGen Cyber Innovation and Technology Center. Learn more about how the companies will contribute to the Alliance at Federal News Radio dot com slash In Depth.
Everyone does it. National Intelligence Director James Clapper told Congress, spying on foreign leaders is a two way street. European allies are guilty of it too. The head of the National Security Agency, General Keith Alexander, said it was the Europeans, not the US, who did a surveillance sweep on phone records overseas. REUTERS is reporting, Chinese officials say they'll ramp up information security amid allegations that the National Security Agency is spying on European allies.
President Barack Obama met with a handful of corporate leaders for a personal chat on cybersecurity. Attendees came from the IT, energy and financial worlds. They included CEO's of Lockheed Martin, Northrup Grumman, Intel, Bank of America, Visa and Mastercard. The National Institute of Standards and Technology released a cybersecurity framework last week. It's voluntary. Now the government has to convince industry to adopt it. The public has 45 days to comment.
The House Armed Services Committee is going to try again to change the way the Pentagon buys weapons and services. The committee's chairman, California Representative Buck McKeon, said some successful efforts were already under way to institute meaningful reforms, but the U.S. military acquisition system faces significant challenges including cost overruns and schedule delays. He predicts the problems will get worse because of mounting pressure on U.S. budgets.
In his first public comments since the portal launched, federal CIO Steve VanRoekel said agencies and contractors can learn from the problems the website encountered. He said many times big failures provide the opening for major changes.
Terry Verigan, vice president of CompuCure, will discuss best practices for small businesses that do work for the federal government. October 29, 2013
With the partial government shutdown behind them, members of Congress are working on several bills that impact the federal workforce, including a resolution that supports ending the federal pay freeze and a bill that tackles the claims backlog at Veterans Affairs.
The Syrian Electronic Army seized control of an online tool used by an advocacy organization for President Obama and redirected links sent from Obama's Twitter and Facebook accounts. The pages carried links that were intended to take readers to a Washington Post story on immigration, but as a result of the hack, redirected readers to a video of the Syrian conflict instead. The hacked link shortener is used by Organizing for Action, a group that evolved from Obama's re-election campaign. Obama's Twitter account itself was not hacked.
A British man is arrested and charged with hacking into computer systems of the Army, NASA and other federal agencies. On Monday, a grand jury indicted a British man and his three partners for stealing information about government employees with the intent of disrupting federal government operations. Lauri Love allegedly hacked thousands of systems including the Missile Defense Agency, the Army Corps of Engineers and the EPA. For almost a year Love was able to infiltrate systems, compromising personal data of military personnel and defense budgets. Prosecutors says the Army's Aberdeen Proving Ground in Maryland was one of the hacked systems. Love faces up up to 5 years in prison for each offense.
Kimberley Williams Chief Strategist – Public Sector Informatica A public sector enterprise software veteran, Kimberley Williams brings over 20 years of implementation, technical sales, and marketing experience from enterprise software giants including Curam Software, PeopleSoft,…
Chris Howard Director of Sales, Federal Chris Howard is a Director of Federal sales for the Nutanix team. He has been selling into the Federal Government for 15+ years with an emphasis on Virtualization and…
Virtualization is at the heart of these programs, and government's failure rate has been high due to unwieldy, expensive and complicated infrastructure. The ramp-up of virtualization efforts in government requires agencies to take into account infrastructure-related challenges such as scalability, complexity, cost, performance and more. And more agencies are rolling out virtualization solutions that allow Bring-Your-Own-Device users to stay productive no matter where, or how, they work.