India outstripped the United States, China, Japan and Singapore for personal computer security, according to a recent study by McAfee.
Veteran Affairs' CIO Roger Baker pointed to concerns over cybersecurity as the reason why he's wary about agencies adopting bring-your-own-device initiatives.
The New York Times reports the efforts, code name "Olympic Games", began during the Bush administration and one of the strings of code that accidentally became public became known as Stuxnet.
A group called the Virginia Tech Intelligence and Defense Executive Alumni, or VT-IDEA, will hold an exhibition of new technology later this month. It's already seen commercialization of remote smartphone wiping technology.
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
CIO Lt. Gen. Susan Lawrence said better systems at posts, camps and stations will let soldiers train on the same equipment as they use in the field. The move to the cloud, data center consolidation and enterprise email are pushing the Army toward a data-centric approach. May 31, 2012
One senator is questioning why it took nine months for the Thrift Savings Plan board to find out about a sophisticated cyber attack that compromised 123,000 TSP participants' accounts. Sen. Susan Collins (R-Maine) also wants to know why Congress wasn't informed of the breach until more than a month after it was reported to the board.
Federal Technology Analyst Jason Wilson sizes up the defense cyber market. Defense Financial Analyst Sopen Shah looks at potential targets for mergers and acquisitions. Data Analyst Peter Brusoe looks at how federal contractors are donating money this campaign season.
The Industry Botnet Group — coordinated by the White House Cybersecurity Office and the Departments of Commerce and Homeland Security — has posted nine principles, including coordination of cyber responsibilities across sectors and reporting lessons learned.
In an exclusive interview with Federal News Radio, White House Cyber Czar Howard Schmidt said a majority of the senior leaders in government understand the importance of securing agency, contractor and critical infrastructure systems. He said among his office's biggest accomplishments is moving the day-to-day cyber authority of federal civilian networks to DHS. Michael Daniel will replace Schmidt, whose last day is in early June.
Andy Ozment returns to work with new cyber coordinator Michael Daniel. Ozment worked at DHS for the last year as director for compliance and technology.
Ma Xiaotian, deputy chief of the general staff of the People's Liberation Army, said the cybersecurity issue is creeping from the virtual world into the real world.
Jason Wilson, a reporter for Bloomberg Government, examined federal defense spending on cybersecurity for a new Bloomberg study. He joined In Depth with Francis Rose to discuss the overall trends he's noticed.
A sophisticated cyber attack against the Thrift Savings Plan contractor responsible for maintaining the agency's data centers compromised the information of 123,000 TSP participants. However, there is no indication the data has been misused, according to the Federal Retirement Thrift Investment Board. There is also no indication that the TSP's network or its website were affected.
A Heritage Foundation report said of all the cybersecurity bills before Congress right now, the most important issue is the government would regulate activities in both the public and private sector.