Center CIO Mike Bolger said encrypting laptops and implementing logical access are among his top priorities in 2012. Kennedy Space Center also is exploring how to let employees using their personal smartphones or tablet computers on the network. March 29, 2012
Gregory Wilshusen, GSA\'s director of information security issue, discussed a recent report about IT supply chain risks with The Federal Drive with Tom Temin and Emily Kopp
Kshemendra Paul, Information Sharing Environment\'s program manager, joined The Federal Drive with Tom Temin and Emily Kopp at the Acquisition Excellence Conference in Washington.
The National Telecommunications and Information Administration told a House panel it is trying to expand deployment of technology known as DNS-SEC.
The Pentagon still is responding to major cyber attacks on the nation after the fact, the military\'s top cyber official said Tuesday. It would rather stop them before they succeed.
Two GAO reports find agencies lack oversight and controls over ensuring vendors buy the components for hardware and software from trusted sources. DoD is ahead of most agencies. It is using intelligence expertise to secure the supply chain of national security systems.
The House Oversight and Government Reform Committee unveiled a bill to overhaul a decade-old law detailing how federal agencies protect their computer networks from cybersecurity threats. Rep. Darrell Issa (R-Calif.), the chairman of the committee, told Federal News Radio the Office of Management and Budget is better poised to be a \"fair arbitrator\" than the Homeland Security Department.
Howard Schmidt, on his blog, lists the areas for improvement within federal cybersecurity.
FBI allowed the servers to run for 120 days to give owners of infected computers time to clean out the DNSchanger malware. But the bureau dropped the ball on getting the word out.
The Committee on Oversight and Government Reform posted the bill on its Madison website to let people view the bill before it is formally introduced.
The hacker group LulzSec is promising more activity, despite the arrests of six active members earlier this month. In a message posted to YouTube, the group said it would start to take hacking action against governments, corporations and agencies beginning April 1.
Staying ahead of evolving cyber threats means developing technology and people, according to several defense officials testifying to the Senate Armed Services subcommittee on emerging threats and capabilities.
The methods may not have changed much, but the motivations of cyber attackers morphed in 2011. Worldwide political upheaval, from the so-called Arab Spring to the Occupy movement, had a cyber threat angle.
A new Internet Botnet Group will bring together federal and industry experts to try to stem the tide against botnet attacks. Experts estimate one in 10 computers are controlled by bad actors using malicious software to attack organizations. FCC working groups released three reports with recommendations for improve cybersecurity.
The military\'s chief information officer, Teri Takai, said after the Army completes its migration to DISA\'s email-as-a-service, the Air Force will be next. She said the Navy also is in discussions to move to the cloud. DoD soon will release a new cloud computing strategy and standards guide for industry. March 22, 2012(Encore presentation April 19, 2012)