Tight budgets and a long procurement process will drive federal agencies into outsourcing cybersecurity. They\'ll buy it as a service instead of purchasing software to install and monitor agency systems.
Lots of computer smarties could help the federal government with its cyber security problem. But arcane rules prevent them from doing so.
Cyberattacks on state and federal databases are \"one of the nation\'s greatest emerging threats\", warned Maryland Gov. Martin O\'Malley.
The agency and the CIO Council creates a list of the competencies cybersecurity workers need. OPM\'s Kichak said agencies will have a common understanding of the skills and abilities these employees need.
Gen. Keith Alexander, commander of the military\'s new Cyber Command and the director of the NSA, said DoD can help protect private networks from cyber attack - especially critical infrastructure - without infringing on civil liberties. He said civilian agencies and private network operators could leverage NSA\'s capabilities without having the spy agency be in charge of security.
The administration\'s IT agenda for fiscal 2012 will include new tools to combat cyber threats as well as major overhauls to how agencies manage their systems. Agency CIOs say agility will be important moving forward.
Government IT systems are at increased risk to inside and outside threats because departments lack centralized budget and operational authority over their IT systems, says Roger Baker.
OMB mandated departments implement continuous monitoring of their cyber networks by 2012. Part of meeting that goal is understanding what hardware and software currently reside on the computing backbone.
A Texas man who admitted hacking into the computer systems of a Minnesota company and NASA\'s Goddard Space Flight Center in Maryland pleaded guilty Wednesday to one count of wire fraud.
The Cyber Command is focused on achieving real-time capabilities, but the director of current operations said they still have serious work to do. He appealed to industry leaders for help designing a sufficient platform.
A group of computer hackers hijacked websites run by the Voice of America this week, sending its online traffic to an Internet website claimed to be run by the Iranian Cyber Army.
The Air Force wants to create a whole unit of non-existent identities on social media sites.
DoD is trying to figure out how to keep risks that one part of the organization takes from affecting the rest of the military\'s networks. DISA addressing other security goals by adding PKI to secret network.
A new cyber competition and conference have been designed to attract more students and young professionals to pursue careers in cybersecurity. SAIC\'s Larry Cox explains.
Internet attacks from hackers, spies and terrorist groups deserves serious attention, says Howard Schmidt, but this should not be \"to the extent of mass hysteria\".