Despite news to the contrary, the Homeland Security Department has not picked a vendor to provide the CDM dashboard. This post is part of Jason Miller's Inside the Reporter's Notebook feature.
Evan Lesser, founder and director of ClearanceJobs.com will discuss how cleared professionals should be dealing with social media. September 5, 2014
Both the Army and Air National Guard say they are making inroads toward gaining a foothold for their state-based forces in the Defense Department's growing mission sets in cyberspace. Both services say they are training more personnel and building the guard's credibility within the Pentagon when it comes to cyber missions.
Former GSA official Dave McClure left government in June and now is an executive at the Veris Group.
The Environmental Protection Agency can't keep track of the data it stores in the cloud. EPA's Inspector General says it a subcontractor for a water permit system was using a cloud system to run its share of the operation, but neither the agency nor the prime contractor was aware of it. Albert Schmidt is an IT auditor of Information Resources Management and audits for the EPA's Inspector General. He says this type of cybersecurity problem isn't entirely the agency's fault.
It seems like the whole world is going mobile, and that includes the federal government. Agencies are using more and more apps for collaboration and productivity. But some apps increase the potential for exposing government data. To help you guard against these security risks, the National Institute of Standards and Technology is providing tips to the federal community for vetting third-party apps. Computer Scientist, Tom Karygiannis, joined Tom Temin on the Federal Drive to discuss the guidelines.
Chris LaPoint, vice president of Product Management for SolarWinds will discuss how his company can help your agency manage its information technology system. August 26, 2014
Labor Department Deputy CIO Dawn Leaf joins Federal News Radio for an online chat to discuss her priorities around IT modernization, data center consolidation and cybersecurity.
The Defense Information Systems Agency will begin to shake up its organizational chart in significant ways beginning on Oct. 1. But officials, so far, are reluctant to discuss the details.
New details emerge about the cyber attack against USIS. Hackers accessed personal information of Department of Homeland Security workers, including Social Security numbers, dates of birth and addresses. DHS will offer credit monitoring services to the affected employees.
Plans for the 11th annual Cybersecurity Awareness Month are underway at the Department of Homeland Security. DHS will partner up with the National Cyber Security Alliance to offer different events each week catered for federal agencies, individuals, and private companies. Week One will focus on the basics of cybersecurity. Starting in Week Two the topics get a little more specific. You can learn about how to develop more secure IT products, including cloud systems, and in Week Four the theme is cybersecurity for small and medium-sized businesses. DHS and the National Cyber Security Alliance hope the outreach will strengthen and build cybersecurity best practices for both private companies and federal agencies.
The Defense Information Systems Agency, which serves as the broker between Defense Department components and commercial providers of cloud computing services, says the certification standards it set for commercial providers may be too arduous for vendors. DoD also launched five pilots to test the use of commercial cloud providers and is reassessing how it develops cloud requirements.
The National Security Agency closed down an office dedicated to mobility, because devices and apps have become part of the fabric of everything the agency does. But NSA, like all agencies, still must figure out how to secure mobile devices using derived credentials.
Todd Weller of Hexis Cyber discusses the types of security threats federal agencies are facing on this week's Federal Tech Talk radio show.
The fast-growing number of devices connected to the Internet means enterprises need to rethink their approaches to cybersecurity. Cyber expert Melissa Hathaway says we're at a cyber inflection point. She's the president of Hathaway Global Strategies and former director of the Joint Interagency Cyber Task Force. She joined Tom Temin on the Federal Drive to discuss the top concerns for cybersecurity.