Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Without a serious effort at automation, the many segments of the cybersecurity response and kill-chain threaten to overwhelm security operations and information security staffs.
Clark Campbell, the vice president for public sector for BDNA, argues that if agencies don’t address end of life technology, the next cyber attack could be much worse.
Dave Mihelcic, federal chief technology and strategy officer for Juniper Networks, discusses innovation, information assurance, security, integration and how his company can help agencies move to the cloud. July 11, 2017
John Chirhart, the federal technical director of Tenable, argues for a fundamental change in the way agencies approach cybersecurity for the long-term.
It seems like big-time cyber attacks are getting worse and more frequent. The federal government seems to have avoided the most recent ones. Vince Crisler, CEO of Dark Cubed, tells Federal Drive with Tom Temin how federal managers can keep their organizations safe.
Near-weekly, worldwide cybersecurity threats underscore the importance of network, end-point, and application monitoring. Federal agencies have worked under a policy of continuous monitoring/continuous diagnostics and mitigation for a decade. But given the seemingly unending growth in attack vectors, the spread of internal infrastructure to commercial cloud providers, and the rise of insider threats – they’ve got to up the game into what might be called advanced cyber monitoring.
The Defense Department has started testing one potential technology to replace the Common Access Card. This one purports to identify users by the ways in which they manipulate their mouse and type on their keyboards.
The Office of Management and Budget is writing a new consolidated policy on identity management. The forthcoming guidance is designed to give agencies one place to view OMB's collection of identity management policies and lessons learned over the past several years.
Who is actually responsible for that cyber attack that hit your organization? Often it comes down to guess work. Few people have much faith in the accuracy of the attribution. So what to do? John Davis II, senior information scientist at the Rand Corporation and co-director for scalable computing and analysis, joined Federal Drive with Tom Temin with recommendations.
Jeanette Manfra, the acting deputy undersecretary for cybersecurity at the Homeland Security Department, offered an in-depth look into the steps DHS and the government took to keep federal agencies safe from WannaCry.
Despite all expectations, total average compensation for employees with security clearances has actually slightly declined, dropping 1.27 percent, since 2014.
Insider Threat programs across all agencies must develop alongside technology, the GAO reports. However, the Department of Defense is making significant progress.
The Defense Information Systems Agency is hard at work on the next generation of mobile, secure computing for the Defense Department. And it's up to some heavy contracting activity.
If you've got kids or grandchildren and you’ve got a phone, Senior Correspondent Mike Causey says you may also have a bull's-eye painted on your purse or wallet.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.