Technology

  • Cyber breaches at the Office of Personnel Management and Ashley Madison may have something in common: you. The Los Angeles Times reports foreign spy services are hacking and aggregating data from U.S. networks to build their files on U.S. intelligence officers. Ron Marks is senior fellow for the Center for Cyber and Homeland Security at George Washington University and a former CIA special assistant. He tells In Depth with Francis Rose the OPM breach was never about identity theft, but a plan to learn more about what you're doing and where you're going.

    September 01, 2015
  • Faisal Iqbal, public sector CTO for Citrix, offers four things agencies should start today to improve the security of their networks and data.

    September 01, 2015
  • Bill Corrington, federal director for the Cloud Security Alliance and Juanita Koilpillai, founder and CEO of Waverly Labs, join host John Gilroy to explain why Software Defined Perimeters is a new paradigm in computer security. September 1, 2015

    August 31, 2015
  • DHS and GSA choose Booz Allen and HP Enterprise Services to provide tools and services under two task orders under the Continuous Diagnostics and Mitigation program.

    August 31, 2015
  • Agencies have until the end of 2016 to store all email records electronically — and until 2019 to store all electronic records in their original formats. Most agencies tell the National Archives and Records Administration they'll meet those deadlines. But the line between what's considered a federal record and what's not is getting blurry. Jason R. Baron is of counsel at Drinker Biddle and former director of litigation at NARA. He tells In Depth with Francis Rose about some best practices federal employees can use at a time when Tweets, texts and even Snapchats are often government records.

    August 31, 2015
  • The Defense Department needs a 21st century security network that can handle a growing number of sophisticated threats. The Pentagon has already put a lot of work and resources into the Host-Based Security System. It's part of DoD's first coordinated departmentwide security system. Dan Goure is vice president of the Lexington Institute. He tells In Depth with Francis Rose about a six-step strategy the Pentagon should pursue to build off the system it already has.

    August 31, 2015
  • The Pentagon says its contribution for a new manufacturing institute dedicated to flexible electronics will be matched by $96 million in corporate and institutional funding. Officials say it could lead to a significant lightening of a soldier's loads and real-time damage reports from individual bulkheads aboard Navy ships.

    August 31, 2015
  • The Defense Department's new rules for contractors to report cyber breaches could end up costing the military a lot more than it thinks.

    August 31, 2015