Cybersecurity

  • The Information Technology Box is the Army's new method of procuring cyber solutions quickly. The Army will use it to procure tools to support defensive cyber operations like sensors and analytics. But the box itself isn't new. Kevin Fahey, executive director of the System of Systems Engineering and Integration Directorate in the office of the Assistant Secretary of the Army for Acquisition, Logistics and Technology, joined In Depth with Francis Rose on Pentagon Solutions. Fahey said DoD first used the IT box construct around 2008.

    September 16, 2015
  • Sol Cates, chief security officer for Vormetric, argues that while new policies and regulations are important, the answer to an organization’s cybersecurity problems starts with making a decision to dedicating more resources to solutions and less to filling out forms.

    September 15, 2015
  • A new memo from Office of Personnel Management Acting Director Beth Cobert does little to ease her Inspector General's concerns with OPM's Infrastructure Improvement Project.

    September 14, 2015
  • The White House is finalizing plans for its new Cyber Threat Intelligence Integration Center. The center will connect the cyber dots for civilian, DoD and intelligence community agencies. In the latest edition of his weekly feature, Inside the Reporter’s Notebook, Federal News Radio’s executive editor Jason Miller writes about the launch of this new center.

    September 14, 2015
  • Some State Department IT officials may have jumped the gun in issuing an RFI for a cyber playbook.

    September 14, 2015
  • USA Today found that the National Nuclear Security Administration (NNSA) experienced 19 successful attacks during the four-year period.

    September 14, 2015
  • Michael Daniel, the White House cybersecurity coordinator, said the new Cyber Threat Intelligence Integration Center (CTIIC) will work behind the scenes to connect the cyber dots.

    September 14, 2015
  • Agency tech staffs too often erase important forensic evidence after a cyber attack. Homeland Security is trying to change that so system administrators preserve data. Ann Barron-DiCamillo is the Director of the U.S. Computer Emergency Response Team. She tells Executive Editor Jason Miller about some of the disturbing trends her team sees and how agencies can avoid erasing forensic evidence after a cyber attack.

    September 11, 2015
  • DHS is trying to change how agencies react to when they discover a cyber attack. Too often, those responses are hampering forensic investigations.

    September 11, 2015
  • Following cyber penetrations of federal IT systems at the Office of Personnel Management and elsewhere, the Office of the Director of National Intelligence says it’s launching a comprehensive governmentwide counterintelligence campaign. It wants to head off future data thefts and blunt their impact. As Federal News Radio’s Jared Serbu reports, the program’s first phase will focus on preventing spear phishing attacks.

    September 10, 2015
  • Responding to cyber penetrations into federal IT systems at the Office of Personnel Management and elsewhere, the Office of the Director of National Intelligence said Wednesday that it was launching a “comprehensive” and governmentwide counterintelligence campaign.

    September 10, 2015
  • Federal CIO Tony Scott said because of the wide-spread use of legacy IT systems, agencies should consider a similar approach to cybersecurity to one that manufacturers use when addressing product defects.

    September 10, 2015
  • Housing and Urban Development Secretary Julian Castro said he's committed to improving HUD’s IT environment and its tools for monitoring program and financial performance.

    September 08, 2015
  • Shadow IT, the stuff that's on a network that leadership doesn't know is on the network, plagues agencies across government. Shawn Kingsberry, former chief information officer at the Recovery Accountability and Transparency Board and director of cloud solutions at Engility Inc., tells In Depth with Francis Rose the shadow IT concept is starting to seep into the bring-your-own-device arena.

    September 08, 2015

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.