Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The National Institute of Standards and Technology wants comments on new draft guidelines for securing Basic Input Output System systems. BIOS is the first software activated after turning a computer on and has increasingly become a new target for hackers.
A proposed rule would make contractors responsible for securing networks that store any type of government information. It defines key terms like information and "information system."
Marine Lt. Gen Richard Mills told an audience at a conference in Baltimore last that he led cyber attacks in Afghanistan.
The plan calls for the creation of two new bodies. The Cyber Investment Management Board would oversee cyber acquisition, and a Cyber Capabilities Team would look at technology and policy requirements.
Maj. Gen. John Davis moves up from the position of director of current operations at the Cyber Command.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command
The fixes plug vulnerabilities in Flash Player. If left untreated, they could cause a system crash or allow attackers to take control of a computer.
If the claims are true, it means hackers could spy on network traffic, obtain credentials to get on the inside and attack the power plants.
The research agency DARPA is hosting a daylong event Sept. 27 on its upcoming "Plan X" that focuses on building solid attack strategies and tools.
The department is trying to figure out the best way to manage the cards of contract employees after they leave the department. Every agency using a managed service provider for secure identity card issuance faces a similar challenge. Commerce also is working on integrating physical and logical access systems.
Sources say the Defense Department is behind on implementing the new plan and may in fact be exploring other options.
The Army chief information officer said the military service was well on its way to completely migrating to the cloud-based email by March.
The military, working through DARPA, is trying to develop its own marketplace of apps for helping troops in the field.
They say hackers who want to steal cars or just eavesdrop on conversations may have an easy time of it.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.