Cybersecurity

  • Tight budgets and a long procurement process will drive federal agencies into outsourcing cybersecurity. They\'ll buy it as a service instead of purchasing software to install and monitor agency systems.

    March 03, 2011
  • Lots of computer smarties could help the federal government with its cyber security problem. But arcane rules prevent them from doing so.

    March 02, 2011
  • Cyberattacks on state and federal databases are \"one of the nation\'s greatest emerging threats\", warned Maryland Gov. Martin O\'Malley.

    March 01, 2011
  • The agency and the CIO Council creates a list of the competencies cybersecurity workers need. OPM\'s Kichak said agencies will have a common understanding of the skills and abilities these employees need.

    February 28, 2011
  • Gen. Keith Alexander, commander of the military\'s new Cyber Command and the director of the NSA, said DoD can help protect private networks from cyber attack - especially critical infrastructure - without infringing on civil liberties. He said civilian agencies and private network operators could leverage NSA\'s capabilities without having the spy agency be in charge of security.

    February 28, 2011
  • The administration\'s IT agenda for fiscal 2012 will include new tools to combat cyber threats as well as major overhauls to how agencies manage their systems. Agency CIOs say agility will be important moving forward.

    February 28, 2011
  • Government IT systems are at increased risk to inside and outside threats because departments lack centralized budget and operational authority over their IT systems, says Roger Baker.

    February 25, 2011
  • OMB mandated departments implement continuous monitoring of their cyber networks by 2012. Part of meeting that goal is understanding what hardware and software currently reside on the computing backbone.

    February 25, 2011
  • A Texas man who admitted hacking into the computer systems of a Minnesota company and NASA\'s Goddard Space Flight Center in Maryland pleaded guilty Wednesday to one count of wire fraud.

    February 24, 2011
  • The Cyber Command is focused on achieving real-time capabilities, but the director of current operations said they still have serious work to do. He appealed to industry leaders for help designing a sufficient platform.

    February 24, 2011
  • A group of computer hackers hijacked websites run by the Voice of America this week, sending its online traffic to an Internet website claimed to be run by the Iranian Cyber Army.

    February 23, 2011
  • The Air Force wants to create a whole unit of non-existent identities on social media sites.

    February 23, 2011
  • DoD is trying to figure out how to keep risks that one part of the organization takes from affecting the rest of the military\'s networks. DISA addressing other security goals by adding PKI to secret network.

    February 21, 2011
  • A new cyber competition and conference have been designed to attract more students and young professionals to pursue careers in cybersecurity. SAIC\'s Larry Cox explains.

    February 21, 2011
  • Internet attacks from hackers, spies and terrorist groups deserves serious attention, says Howard Schmidt, but this should not be \"to the extent of mass hysteria\".

    February 18, 2011