Mark Forman, the first e-gov administrator at the Office of Management and Budget, joined In Depth with Francis Rose to discuss the major cybersecurity challenges faced by federal IT officials in 2011 and what to look for in 2012.
Congress is putting the spy world on a diet by trimming back planned growth in staff and high-tech surveillance programs.
Chinese hackers were able to access information about the Chamber\'s operations and its 3 million members.
Under the cloud security requirements, vendors who want to be third party assessment organizations and cloud service providers must prove they have walled-off the two parts of their company. GSA released details Dec. 8 and held an industry day Dec. 16 for vendors who want to be third-party assessers. GSA expects to release the FedRAMP security controls early in 2012.
Defense minister describes country\'s websites as operating at a \"general threat\" level.
The International Informations Systems Security Certification Consortium, Inc. — or (ISC)2 &mdashl; has awarded five scholarships as part of a cybersecurity challenge for high schoolers. The organization works with the U.S. Cyber Challenge, a national public-private coalition.
Lockheed Martin and Northrop Grumman are among the defense contractors lining up for a shot at the $42 million contract.
\"Crawl before you can walk. Walk before you can run.\" That\'s how Federal CIO Steve VanRoekel framed his 2012 priorities in his first speech to government IT contractors in Washington. He said agencies would have to do \"more with less,\" but he wanted to emphasize the \"more.\"
Lee Rainie, the director of the Pew Internet Project, joined In Depth with Francis Rose to discuss the growing trend of \"sousveillance,\" a term created to describe, bottom-up surveillance.
Chris Wysopal, the co-founder and chief technology officer of Veracode, joined In Depth with Francis Rose to discuss a recent Veracode report examining the federal government\'s security posture for its mobile applications. The report found agency apps are often at higher risk of certain attacks.
Former E-Government and IT Administrators Mark Forman and Karen Evans count down the top federal IT news stories of the year.
Irvine Sensors Corporation, called ISC8, says it has drawn down the entire $5 million available under the facility and has used nearly $2 million to pay off its debts.
ISC2 sponsored the challenge. The idea is to spark interest in the field of cybersecurity to help build a broader pool for a future cybersecurity workforce.
Lieberman said a congressional staff is reviewing draft legislative language of the comprehensive cybersecurity legislation, which includes an update to the 2002 Federal Information Security Management Act. Sen. Reid promised to work on a cyber bill during the early part of the Senate session in 2012.
The White House released the new plan to focus on four broad areas to improve cybersecurity in the government and in the private sector. Howard Schmidt, the White House cyber coordinator, said agencies will issue RFPs and RFIs to meet the strategy\'s goals.