Technology

  • U.S. officials have largely ruled out North Korea as the origin of a computer attack last July that took down U.S. and South Korean government websites. But, authorities aren\'t much closer than they were a year ago to knowing exactly who did it, or why. Early analysis of the fast-moving \"denial of service\" attacks pointed to North Korea since code used included Korean language. Experts say agencies are better prepared today, but that many government and business sites remain vulnerable to similar attacks.

    July 09, 2010
  • The so-called \"continuous monitoring\" of systems is becoming a hot topic in government. That\'s because under federal guidelines, agencies must report how they protect their information systems, plus, agencies are now required to submit real-time data about the state of their networks. Continuous monitoring doesn\'t mean systems have to be watched every minute. Even now, some agencies are able to monitor their systems through international networks at least once a day.

    July 09, 2010
  • A new study that finds 80-percent of I-T managers expect network-born threats to increase over the next year. Perhaps even more troubling, more than half of managers told netForensics their organization was not budgeting enough, or recruiting enough new talent, to counter any added cyber-threats. Almost 25-percent of respondents said they saw a decrease in staff size in the last year. More than half of the managers polled did however say their organization was more secure now than it was a year ago.

    July 09, 2010
  • A software trade association has produced a first-of-its-kind cybersecurity framework to help guide governments\' security efforts worldwide. Officials with the Business Software Alliance say it\'s needed to help countries put together policies that will thwart the many kinds kinds of cybersecurity threats that exist. Working with the private sector and prosecuting cyber-criminals are key parts of the framework.

    July 09, 2010
  • Pencils down. The code in the Cyber Command logo has been cracked.

    July 09, 2010
  • HP receives deal that could be for up to five years and worth up to $3 billion. Navy continues to develop follow-on contract, NGEN.

    July 09, 2010
  • DHS will oversee and provide assistance to civilian agencies to improve how they protect their computer networks. White House cyber coordinator Schmidt says the goal of the memo is to make sure agency roles and responsibilities are clear. Schmidt also calls for more valuable public-private partnerships.

    July 09, 2010
  • There are some real concerns coming from several directions over the program.

    July 08, 2010
  • Mobile phones may be the answer to linking federal agencies with the public.

    July 08, 2010
  • Hear this week\'s guest, Jim Mears, Vice President and General Manager of Motorola, Inc., talk about communication in the 21st century. July 13, 2010

    July 08, 2010
  • In an Israeli district court decision, the municipality of Tel Aviv has been ordered to publish its 2011 budget in machine-readable format, following a legal battle and a subsequent admission by Tel Aviv that the city had the resources to do so.

    July 08, 2010
  • A survey found that 85 percent of 895 \"technology stakeholders\" and pundits agreed that the Internet has mostly been a positive force in peoples\' social lives.

    July 08, 2010
  • These included a travel advice app from the Foreign Office and a jobseekers\' tool.

    July 08, 2010

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.