John Chirhart, the federal technical director of Tenable, argues for a fundamental change in the way agencies approach cybersecurity for the long-term.
It seems like big-time cyber attacks are getting worse and more frequent. The federal government seems to have avoided the most recent ones. Vince Crisler, CEO of Dark Cubed, tells Federal Drive with Tom Temin how federal managers can keep their organizations safe.
Near-weekly, worldwide cybersecurity threats underscore the importance of network, end-point, and application monitoring. Federal agencies have worked under a policy of continuous monitoring/continuous diagnostics and mitigation for a decade. But given the seemingly unending growth in attack vectors, the spread of internal infrastructure to commercial cloud providers, and the rise of insider threats – they’ve got to up the game into what might be called advanced cyber monitoring.
The Defense Department has started testing one potential technology to replace the Common Access Card. This one purports to identify users by the ways in which they manipulate their mouse and type on their keyboards.
The Office of Management and Budget is writing a new consolidated policy on identity management. The forthcoming guidance is designed to give agencies one place to view OMB's collection of identity management policies and lessons learned over the past several years.
Who is actually responsible for that cyber attack that hit your organization? Often it comes down to guess work. Few people have much faith in the accuracy of the attribution. So what to do? John Davis II, senior information scientist at the Rand Corporation and co-director for scalable computing and analysis, joined Federal Drive with Tom Temin with recommendations.
Jeanette Manfra, the acting deputy undersecretary for cybersecurity at the Homeland Security Department, offered an in-depth look into the steps DHS and the government took to keep federal agencies safe from WannaCry.
Despite all expectations, total average compensation for employees with security clearances has actually slightly declined, dropping 1.27 percent, since 2014.
Insider Threat programs across all agencies must develop alongside technology, the GAO reports. However, the Department of Defense is making significant progress.
The Defense Information Systems Agency is hard at work on the next generation of mobile, secure computing for the Defense Department. And it's up to some heavy contracting activity.
If you've got kids or grandchildren and you’ve got a phone, Senior Correspondent Mike Causey says you may also have a bull's-eye painted on your purse or wallet.
Camron Gorguinpour, principal at Woden, joins host John Gilroy on this week's Federal Tech Talk to discuss innovation, open systems architecture and how his company helps organizations gain a new perspective on diversity and defense acquisition. June 27, 2017
Federal agencies trying to fend of the cybersecurity threat are about as not always effective, as breaches and losses are common. In fact, according to research by Thales E-Security and 451 Research, one third of agencies experienced a data breach just in the last year. Wayne Lewandowski, vice president of federal at Thales, joined Federal Drive with Tom Temin to discuss the numbers.
The Veterans Affairs Department’s inspector general said in its annual Federal Information Security Management Act (FISMA) report that the agency’s cybersecurity efforts remain troublesome and puts data and systems at risk.
Allan Liska, threat intelligence analyst at Recorded Future, joins host Derrick Dortch on this week's Fed Access to discuss the rise in ransomware attacks around the world, and what you can do to protect your company or agency from these threats. July 7, 2017