Cybersecurity

  • DHS Science and Technology, Part 2

    The Homeland Security Department’s Science and Technology Directorate is playing matchmaker between systems integrators and up-and-coming companies. The goal is to get cutting-edge cybersecurity technology into the government as quickly as possible. This is part…

  • Cybersecurity update from the Hill

    The House Oversight and Government Reform Committee will add its two cents to the growing number of bills addressing federal cybersecurity. Lawmakers at a hearing today offered a glimpse of what the new bill could…

  • The state of cybersecurity

    When they talk, people listen. That’s the result of a survey of federal chief information security officers. The survey was conducted by (ISC)2 and CISCO and Government Futures. We talk about the survey with (ISC)2…

  • Password management is changing up and down the chain

    When an employee keeps passwords on a sticky note attached to his computer screen, that could be a sign that your agency needs a better password policy.

  • Cyber review heads to final deliberations

    CIO Council offers advice on improving agency input on IT security

  • ‘Good Government’ Group Grades WH Cybersecurity

    As early as this Friday, President Obama is expected to receive a the results of a top-to-bottom review of the nation’s cybersecurity program. The president ordered the review 60 days ago and is expected to…

  • Big risk-taking at small agencies

    Survey finds bigger cybersecurity lapses at smaller agencies.

  • Cybersecurity: the Human Factor

    Employees may be one of the real risks to cybersecurity in your organization. A survey by Applied Research and Symantec shows that human error and deliberate sabotage cause large amounts of data to be lost…

  • NIST Guide Update

    The National Institutes of Standards and Technology is updating a nearly four-year-old publication that guides how agencies protect their computer networks. NIST is trying to help agencies battle the changing nature of the cyber threat…

  • Could we be hacked back in time?

    Looking at real threats in an ether-based world

  • Internal Revenue’s Internal Audit

    How secure are the 98,000 desktop and laptop computers at the Internal Revenue Service? Peggy Begg is the Assistant Inspector General for Security and Information Technology Audits with the Treasury Department. She joins us to…

  • Confickr Worm

    Once again, the world of networked computers held its collective breath last week. Would the Confickr worm morph on April Fool’s Day into real malware? It did not. Why not? Probably for a couple of…

  • Cyber office in White House unlikely?

    Rep. Langevin says OMB may get increased staff instead

  • CISCO On Cybersecurity

    Cybersecurity is constantly evolving. Each year, Cisco taps into some 400 cybersecurity officials across the organization to assess the state of cybersecurity, and they have a new report out on the subject. And there is…