Cybersecurity

  • Continuing the break with State of the Union tradition, President Barack Obama will spend most of the coming week previewing more of the proposals he will outline in the address, including on identity theft, electronic privacy and cybersecurity, the White House announced Saturday.

    January 12, 2015
  • Cyber attacks come in three different flavors, at least when it comes to figuring out who's behind the attack. That's according to Jay Healey -- he's director of Cyber Statecraft Initiative at the Atlantic Council. On In Depth with Francis Rose, he explained the three flavors of cyber attribution.

    January 09, 2015
  • Congressman Elijah Cummings wants KeyPoint Government Solutions to provide him with a briefing and answers to 13 questions about the December cyber vulnerability that put more than 48,000 federal employees at a greater risk of identity theft.

    January 07, 2015
  • Air Force CIO Lt. Gen. Bill Bender said the service is baking in role-based authentication capabilities as part of its move to the MilCloud. He said the Joint Regional Security Stacks (JRSS) will help the Air Force move out of its AFNet architecture.

    January 07, 2015
  • Agencies should consider these six steps to help keep their employees safe and informed during emergencies, says Aviv Siegel, the CTO and co-founder of AtHoc, in a new commentary for Federal News Radio.

    January 07, 2015
  • Disability fraud and deceased benefit fraud are two of the biggest threats to the integrity of the Social Security Administration, according to the agency's Inspector General. Patrick O'Carroll says preventing those types of fraud before they start is his number one priority this year. He shared his Top 3 for 2015 on In Depth with Francis Rose. He tells Federal News Radio's Sean McCalley how his office plans to meet its goal.

    January 06, 2015
  • The insider threat will be more in focus in 2015, according to many of the cyber experts we talked to for this year's Top 3 for 2015. But the insider threat isn't always someone -- or some people -- intentionally doing bad things to hurt your organization. Mischel Kwon is president of Mischel Kwon Associates, and former director of the United States Computer Emergency Readiness Team at the Department of Homeland Security. She shared her Top 3 for 2015 on In Depth with Francis Rose. Kwon says "nerd wars" are the fastest growing form of insider threat.

    January 06, 2015
  • CyberCompEx. It sounds like a new medicine. Actually it's a social network site just for cybersecurity people in and out of government. The Homeland Security Department's Research and Development Division recently announced CyberCompEx. Developed in conjunction with Monster Government Solutions, CyberCompEx will serve as a portal for students, professionals, employers and others interested in the cybersecurity. Karen Evans is the National Director of U.S. Cyber Challenge and one of the architects of the site. She joined Tom Temin on the Federal Drive to discuss the new site.

    January 05, 2015
  • That September cyber breach affected more current and former Postal employees than the 800,000 first reported.

    January 05, 2015
  • As Congress comes back next week, the Defense Department expects to make a huge push to end sequestration -- or at least blunt its effects. Part of the case the Pentagon will make is that its "cost culture" strategy is making a difference in how it's spending the money it does have. Dave Wennergren is Senior Vice President for Technology at the Professional Services Council, and former Assistant Deputy Chief Management Officer at the Defense Department. He shared his Top 3 for 2015 on In Depth with Francis Rose. He said that cost culture will spread from the Pentagon to all across government.

    January 02, 2015
  • A data breach at the Department of Veterans Affairs is the latest in the long line of cyber events in the Federal government. Jane Holl Lute is President and Chief Executive Officer of the Council on Cybersecurity, and former Deputy Secretary of the Homeland Security Department. In her Top 3 for 2015, she writes low cost, basic cybersecurity prevents 80 percent to 90 percent of all known attacks. On In Depth with Francis Rose, she explained whether or not she's confident that equation will stay the same this year since incentives for the bad guys will continue to grow.

    December 30, 2014
  • Four new pieces of cybersecurity legislation give federal IT leaders some new tools to deal with network and information security. But that law may be responding to threats -- or problems -- that are being overcome by events. Responding to the security and privacy challenges of the Internet of Things may require a new level of thinking and legislation. Dave McClure is chief strategist of the Veris Group, and former Associate Administrator of the Office of Citizen Services and Innovative Technologies at the General Services Administration. In his Top 3 for 2015 and on In Depth with Francis Rose, he says the coming year will be the breakout for the Internet of Things.

    December 30, 2014
  • New cybersecurity legislation President Obama signed recently may just be the start of Congress's efforts to improve the government's cyber defenses. The 114th Congress will look at other ways to give government IT leaders tools they need to improve security. Major General Dale Meyerrose (US Air Force ret.) was the first Chief Information Officer of the Office of the Director of National Intelligence. In his Top 3 for 2015, he suggests Congressional response isn't enough. On In Depth with Francis Rose, he said he believes ongoing tensions that social media highlights don't get enough attention from leaders in the federal government.

    December 30, 2014
  • Although most agencies are making progress in securing their information and protecting themselves from cyber threats, they're still falling short of the Cross-Agency Priority (CAP) Goals set by the Obama administration.

    December 30, 2014

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.