Cybersecurity

  • The time to move from contract award to full implementation under the continuous diagnostics and mitigation (CDM) program will force agencies to decide whether to spend money on new tools or wait for those coming from DHS.

    August 24, 2015
  • A new document obtained by Federal News Radio shows just how bad in shape agencies were in terms of cybersecurity as of June, and just how far they came over the summer.

    August 21, 2015
  • While its known as a marketplace for contraband and subculture activity, network defenders have found that movement in the dark web can help predict potential hacks and breaches.

    August 21, 2015
  • Job one for federal agency tech staffs these days can be summed up in one word: Cybersecurity. A big part of ensuring safety of data is making sure networks are protected. Leo Taddeo is the chief security officer at Cryptozone, and former FBI Special Agent in charge of the bureau's Special Operations Cyber Division in New York. He joined the Federal Drive with Tom Temin with some advice on best practices for network monitoring and intrusion prevention.

    August 21, 2015
  • The first iteration of the cybersecurity dashboard under the continuous diagnostics and monitoring is supposed to come out later this month. It will soon be one piece of the toolkit agencies can use to step up their cybersecurity game. Molly O'Neill is vice president for state and local government industry at CGI and former chief information officer at the Environmental Protection Agency. She tells In Depth with Francis Rose why the dashboard is the tool agency managers need to understand where they stand on security.

    August 20, 2015
  • The Army plans on requesting proposals for the third iterations of its ITES and ADMC contracts by next January. New proposals will likely tackle target areas such as mobility, cloud integration and cybersecurity, but CHESS wants to make sure small businesses are in the running for contracts.

    August 20, 2015
  • Improving federal cybersecurity is the goal of a new effort that combines input from government and industry leaders. ACT-IAC is collecting responses from agencies, industry and academia on eight major challenges. The responses will go in a report to the Office of Management and Budget late next month. The public comment period closes Aug. 28. Mike Howell, ACT vice president at-large and deputy program manager at the Information Sharing Environment, tells In Depth with Francis Rose about the kinds of ideas he's looking for.

    August 19, 2015
  • The chairman of the House Oversight and Government Reform Committee sent three letters-- one to OPM, one to DHS and one to one of OPM's main technology contractors, Imperatis Corp., seeking answers to a variety of questions.

    August 19, 2015
  • The Office of Personnel Management faces a third lawsuit in the wake of the cybersecurity breach it suffered in June that resulted in 22 million past, present, and potential federal employees having their personal information stolen.

    August 18, 2015
  • COMMENTARY: Ron Gula, the CEO of Tenable Network Security, makes the case for CIOs not to get overwhelmed by all the security rules and requirements and instead to focus on a few areas that can make a big difference.

    August 18, 2015
  • The Office of Management and Budget just released new guidance on protecting non-sensitive information from federal contractors. The guidance would require contractors follow National Institute for Standards and Technology standards for protecting their information.

    August 17, 2015
  • The real question GSA is trying to gather information on is whether the current cyber and information assurance SINs just need to be improved or if a new one is needed.

    August 17, 2015
  • The first iteration of the cybersecurity dashboard under the continuous diagnostic and mitigation (CDM) is scheduled to be released this month.

    August 17, 2015
  • Federal contractors have new guidance for protecting government information from the CIO and CAO Councils. Contractors will have to comply with some of the same standards agencies do. Jeremy Grant is managing director at the Cheroff Group and former director of the National Strategy for Trusted Identities in Cyberspace at NIST. He tells In Depth with Francis Rose what this means for contractors who will have to comply with these NIST standards.

    August 13, 2015
  • Matt Goodrich, FedRAMP director at the Office of Citizen Services and Innovative Technologies at GSA, wants to hear what's working and what's not as more agencies move to the cloud.

    August 13, 2015