Cybersecurity

  • The Marine Corps will begin a small scale pilot in the next several weeks to determine whether commercial-grade security containers on mobile devices can meet DoD's security demands. If it's successful, Marines envision a BYOD strategy that begins implementation as soon as next year.

    October 24, 2014
  • NASA Ames CIO Jerry Davis joins Federal News Radio for a free online chat to discuss his IT priorities for NASA Ames, including workforce development, big data analysis and his efforts to improve the center's cybersecurity.

    October 23, 2014
  • Jerry Davis, the NASA Ames CIO, said being in the heart of Silicon Valley poses different obstacles when it comes to recruiting and retaining IT employees. He said cloud and cyber are among his top priorities.

    October 23, 2014
  • The Homeland Security Department has reviewed about 18 new or improved cybersecurity tools or technologies that may be added to the continuous diagnostics and mitigation program (CDM). John Streufert, the director of Federal Network Resilience at National Protection and Programs Directorate in DHS, said CDM is not delayed and on track to deliver results.

    October 23, 2014
  • A new Federal News Radio survey of federal chief information officers and deputy CIOs found cyber above all else is the top priority. Charlie Armstrong, the CIO for Customs and Border Protection, said his focus is to protect the data first and foremost and his systems a very close second.

    October 21, 2014
  • The White House wants the government to lead a nationwide effort to reduce identity theft and fraud. More secure government credit cards and multi-factor authentication for federal websites dealing with sensitive citizen data are two ways to do that.

    October 17, 2014
  • The Office of Management and Budget is pushing back against the recent critical report on federal cloud computing efforts by 19 civilian agency inspectors general.

    October 17, 2014
  • Embedding cybersecurity into the Defense Department's design, manufacturing, and supply chain is a goal the Pentagon sees is possible. Mike Papay is Chief Information Security Officer and Vice President at Northrop Grumman, and Frank Cilluffo is director of the George Washington University Cybersecurity Initiative and the Homeland Security Policy Institute. On In Depth with Francis Rose, they offered steps the DoD can take to address the issue.

    October 16, 2014
  • SAIC's Mary Mayonado and Bill Kaczor join Federal News Radio's Custom Media Director Jason Fornicola for a free online chat to discuss the challenges in managing threats throughout the full cybersecurity life cycle - beyond just compliance requirements. Ask the industry experts live and learn about cyber's big picture, how to use data analytics to protect against insider threats, and what they're hearing from customers.

    October 15, 2014
  • Main Video Segment 1: The fundamental differences between cyber security and IT security Segment 2: Risk management and the seven deadly sins of IT security Segment 3: NIST publications and the cloud environment Listen to…

    October 13, 2014
  • The Council of Inspectors General analyzed 77 commercial cloud contracts across 19 civilian agencies and found most failed to implement federal guidance and best practices. Auditors found these shortcomings could put data and systems at a greater risk to cyber attack or data theft.

    October 13, 2014
  • Michael Daniel, the White House cyber coordinator, said the administration believes getting cyber legislation through Congress on small pieces is more likely to be successful than in one comprehensive bill. Legislation to update FISMA, to improve information sharing and to expand the workforce all have garnered bi-partisan support.

    October 10, 2014
  • Andy Ozment, assistant secretary of the Office of Cybersecurity and Communications in DHS, said the CDM, Einstein and Enhance Cybersecurity Services programs are on the upswing in terms of impact and number of users. Ozment said there are no delays with CDM, and the Einstein intrusion detection and prevention software covers 25 percent of all federal employees.

    October 09, 2014
  • In fiscal 2015 FISMA guidance, OMB is trying to close a big hole exposed during the government's reaction to the Heartbleed vulnerability. The White House is giving DHS the authority to regularly conduct proactive scans of certain civilian agency networks. DHS made it clear to Congress earlier this year the delay in getting permission from agencies to scan their networks cost them days in response time during Heartbleed.

    October 03, 2014
  • Pentagon wants to discourage other countries' cyber attacks by convincing them that that DoD will respond, and that the attacks will ultimately prove unsuccessful. Step one is conveying those messages more forcefully.

    October 03, 2014