Cybersecurity

  • Is patience running short among agencies over the Homeland Security Department\'s continuous diagnostics and mitigation (CDM) program?

    May 18, 2015
  • Defense Secretary Ash Carter looks to Silicon Valley for help with its new cyber strategy. But Carter doesn\'t have too much time to get the partnership off the ground before the Obama administration leaves and another one takes its place. Steve Grundman, George Lund fellow at the Atlantic Council and former deputy defense undersecretary for industrial affairs and installations, tells In Depth with Francis Rose why Carter should focus on the wins he can earn now.

    May 15, 2015
  • The National Institute of Standards and Technology is bringing these concepts together in a new document to help improve cyber defense and resilience. Ron Ross, a fellow at NIST, said moving cybersecurity closer to the mission decision-makers will help solve a fundamental flaw in how agencies protect systems and data.

    May 14, 2015
  • Emile Monette, senior advisor for Resilience and Cybersecurity at the General Services Administration, joins host John Gilroy to discuss how to make the acquisition process safer and more effective. May 12, 2015

    May 12, 2015
  • The Chief Information Officer\'s Council held a séance, pulled out its Ouji board and asked for the approval from Rip Van Winkle to raise the United States Government Configuration Baseline (USGCB), otherwise known as the Federal Desktop Core Configuration, from its long slumber.

    May 11, 2015
  • The Senate\'s top two members on homeland security want to know why more isn\'t being done to stop another cyber attack on federal retirement accounts.

    May 08, 2015
  • The Veterans Affairs Department will finalize a strategy to determine how to use public or commercial cloud computing services. VA backed away from public or commercial clouds about three or four years ago because of concerns over records retention capabilities.

    May 08, 2015
  • New plan charts the Navy\'s strategic objectives in cyber over the next five years, with 18-month measures of progress along the way.

    May 07, 2015
  • The Coast Guard unveiled a new cybersecurity strategy earlier this month. It doesn\'t just focus on protecting Coast Guard networks and systems. It also includes the country\'s 3,600 ports. That\'s because so many ports are nearly fully automated, and therefore vulnerable to cyber attacks. Capt. Andrew Tucci is the chief of the Coast Guard\'s Office of Port and Facility Compliance. On the Federal Drive with Tom Temin, he said cyber attacks comprise the fastest growing risk, even at the ports.

    May 05, 2015
  • On Monday, the Pentagon made good on its promise to make more use of the government\'s FedRAMP process, certifying 23 cloud products as secure enough to host DoD low-level data.

    May 05, 2015
  • Chris Cullison and CW Walker from ZeroFOX, join host Derrick Dortch to discuss how hackers and terrorists are using social media to further their agendas. May 1, 2015

    May 01, 2015
  • Two new bills on cybersecurity and information sharing are through the House of Representatives. One of them deals with liability protections that\'s been a sore spot for private sector companies. Karen Evans is national director of the U.S. Cyber Challenge, and former Administrator of E-government at the Office of Management and Budget. She submitted comments on one of the bills, and described them on In Depth with Francis Rose.

    April 27, 2015
  • The Super Bowl of cyber competitions just wrapped up this weekend. Ten teams competed in the National Collegiate Cyber Defense Competition in San Antonio, Texas. Showcases like this one, in which teams show off the skills to protect cyber networks from intruders, are becoming a popular way for companies to scout new — and sorely needed — talent. But the government needs those people too. Jack Harrington is the vice president of cybersecurity and special missions at Raytheon, which hosted last weekend\'s event. He joined Emily Kopp on the Federal Drive to explain what agencies are taking away from competitions like this.

    April 27, 2015
  • Participants in the Thrift Savings Plan might not like to hear their accounts don\'t have all the recommended cybersecurity protections they need. But the Federal Retirement Thrift Investment Board is taking its insider threat security development so seriously, it\'s putting its own cybersecurity testers through the ringer.

    April 23, 2015
  • Lawmakers overwhelmingly passed the National Cybersecurity Protection Advancement Act and the Protecting Cyber Networks Act this week. These are the first cybersecurity information sharing bills with broad support in more than five years.

    April 23, 2015