Rep. Will Hurd (R-Texas) says agencies are moving too slowly to take advantage of cloud computing. Hurd, chairman of the Oversight and Government Reform Subcommittee on IT Operations, held a recent hearing on the state of federal cloud computing. In his weekly feature Inside the Reporter's Notebook executive editor Jason Miller writes about how much progress agencies have made in implementing cloud computing.
There is a growing interest on Capitol Hill to codify some aspects of cloud computing, including the security authorization program known as FedRAMP.
Vice Chief of Naval Operations Adm. Michelle Howard said cyber weapons are following a similar trajectory as nuclear weapons and for now need top command and control authorities to be used.
A rather nasty advanced persistent threat group known as “Naikon” targets governments and commercial interests in South, Southeast Asia and the South China Sea. Now, a team of researchers from two companies, Threat Connect and The Defense Group, has analyzed five years of Naikon activity. They think they've identified the individual behind the malware. Rich Barger is chief intelligence officer at ThreatConnect. He joins the Federal Drive with Tom Temin now with the highlights from Project CameraShy.
Maybe not at the state dinner, but President Obama could put Chinese President Xi Jinping on the defensive with a simple question. “So, how’s Ge Xing these days?” Ge Xing is an obscure officer in…
National Security Agency Director Michael Rogers told lawmakers that NSA needs to be restructured to deal with an ever-changing threat landscape.
If you work or ever worked for the government, if you retired from Uncle Sam, if you applied for but didn't take a federal job, odds are somebody knows a lot of your secrets. Who did it, what exactly did they do, when did it happen, where, and often most elusively, why?
Data protection using encryption won't buy much unless you design it correctly. Like, keeping the keys away from the encrypted data. It's all in NIST publication 800-57. Look it up.
Encryption has been around almost as long as the ability to count. Yet it remains a difficult technology for CIOs to implement. Robert Bigman spent 30 years in the CIA, including 15 as its chief information security officer. Now he's an independent cyber security consultant and president of 2 B Secure. He joins the Federal Drive with Tom Temin with some practical advice for approaching encryption.
The theft of more than 4 million fingerprints is a "black eye" on the face of the Office of Personnel Management, cybersecurity experts say, but it's also a reminder for all agencies and industry to consider the strength of their security access.
The Homeland Security Department picks Raytheon to run the DOMino program, which maintains and improves the intrusion protection and detection system known as EINSTEIN, and develops other cyber tools under the National Cybersecurity Protection System.
Aaron Powell, partner and chief strategy officer for Flexion, joins host John Gilroy to discuss how the concept of Lean software development can be adapted to the federal government. September 22, 2015
U.S. Cyber Command hopes to increase the defensive posture of its networks by imposing more accountability on commanders. Future scorecards will grade local installations. Those with failing grades may face sanctions.
As OMB finalizes new FISMA metrics for 2016, agencies and IGs continue to struggle with a disconnect over risk versus compliance.
Attorney Bob Metzger with Rogers Joseph O'Donnell, PC, joins host Roger Waldron for a wide ranging discussion of the federal government's cybersecurity policies and regulations including the new DFARS cyber rule. September 15, 2015