Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Lawmakers returned to Washington, D.C., this week with a packed agenda. Topping the list of priorities is hammering out final details of a stopgap spending measure to keep the government running beyond the end of the fiscal year -- Sept. 30. Amid the election-year politicking, the list of unfinished business also includes legislation to restructure the financially ailing U.S. Postal Service and a cybersecurity bill that aims to safeguard the nation's critical infrastructure. Perhaps looming largest of all is what Congress plans to do about automatic, across-the-board cuts, known as sequestration, set to take effect Jan. 2. Failure to avert the cuts could send the country over a "fiscal cliff," budget experts warn.
The General Services Administration has announced it has authorized 12 companies as third party assessment organizations for FedRAMP and will will assure cloud services providers meet security requirements.
The administration is considering using an executive order to promote and encourage critical infrastructure providers to improve their cybersecurity. The draft EO, which Federal News Radio obtained details of, mirrors major sections of the second version of the Lieberman- Collins comprehensive cyber bill.
Nominees include former White House cybersecurity czar Howard Schmidt, NIST expert Ron Ross and the late government computer security pioneer Lynn McNulty.
Lookout says hackers in Russia and other countries are using premium messaging services to bilk phone users out of their money. Lookout says most of the attacks affect Android phones.
Gino Magnifico, the ACC's chief information officer, said his component is helping to lead an Armywide effort to develop a new contract writing system. It's not just a technology refresh, however. It's about improving the business processes. September 6, 2012
BlackBerry smartphones and iPhones are increasingly becoming the target of a phishing campaign to infect computers with malware. Users receive an email saying they need to set up a Blackberry ID, but the link it provides installs the malicious software. According to SC Magazine, the the malware can often go undetected by a lot of anti-virus programs.
On this week's Bloomberg Government Capital Impact show, analysts will discuss three companies that may benefit from sequestration, rules that could slow the adoption for electronic health records, and the latest on Dodd-Frank. September 6, 2012
Sanjay Castelino, with Austin, Texas-based IT firm SolarWinds, joined Industry Chatter to discuss the growing phenomenon of "bring-your-own-device" at federal agencies. The BYOD shift is part of an evolution toward the consumerization of IT, Castelino said.
Secretary of State Hillary Rodham Clinton said both the United States and China are victims of increasingly frequent cyber attacks.
Federal Energy Regulatory Commission Chairman Jon Wellinghoff said he needs congressional approval to manage cybersecurity on the electric grid.
DISA laid out its vision in a new five-year strategy. It said it will work with the U.S. Cyber Command to build up the Pentagon's cyber defenses.
Horace Blackman, CIO and director of IT support services at the Veterans Affairs Department Central Office talks about how mobile devices are handled at his agency. September 4, 2012
McAfee says Android devices are the most vulnerable. Twitter has become one of the major threat vectors.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.