Technology

  • The Army has awarded a contract for cyber maneuvering technology so that network administrators can stay a few steps ahead of hackers.

    July 18, 2012
  • New guidelines could help agencies adopting bring-your-own-device strategies manage the potential risks smartphones and tablets could pose.

    July 18, 2012
  • W. Hord Tipton, executive director of The International Information Systems Security Certification Consortium (ISC)2, talks about his tenure as CIO of the Department of the Interior, and what you can do to protect data at your agency. July 17, 2012

    July 17, 2012
  • The General Services Administration focuses on the potential of a broker to negotiate between providers and consumers regarding cloud computing services in its Request for Information, released Tuesday. While today's RFI includes a variety of specific questions, GSA also remains open to other types of suggestion from industry.

    July 17, 2012
  • The FBI wants an automated testing system that can handle all Android applications. Researchers are trying to standardize a technique called fuzzing that forces outside data into the apps to find weaknesses.

    July 17, 2012
  • The U.S. Cyber Challenge's annual cybersecurity camp program is now underway. It will run through July 20. Invited participants will go through four days of intensive training aimed at assessing and recruiting top cybersecurity talent.

    July 16, 2012
  • Homeland Security Secretary Janet Napolitano met with governors this weekend to highlight the role states can play in responding to cyber incidents. She spoke at the National Governors Association meeting in Williamsburg, Va.

    July 16, 2012
  • Using a DARPA grant and its own money, the FBI has enlisted researchers at George Mason University to try out so-called fuzzing attacks.

    July 16, 2012
  • About 700 airmen just received iPads to use as electronic flight bags.

    July 16, 2012
  • The agency turns to teams of experts to review how departments are meeting the Trusted Internet Connections (TIC) initiative. DHS plans to expand the use of Blue Teams to the implementation of continuous monitoring and two-factor authentication under Homeland Security Presidential Directive-12.

    July 16, 2012
  • The Defense Department has released its first strategy for cloud computing. The plan calls for a departmentwide cloud architecture, but it will be delivered by multiple cloud providers. The Defense Information Systems Agency will serve as DoD's cloud broker. It'll be in charge of continuing to develop DoD's private cloud, but coordinate the delivery of cloud services provided by commercial companies. DoD also plans to lean heavily on the new FedRAMP program, the federal government's new process for certifying that commercial cloud products are secure.

    July 13, 2012
  • Yahoo confirmed that a hacker group stole, then posted 450,000 unencrypted user-names and passwords from one of its services.

    July 13, 2012
  • Thousands of people across the country have been conned into giving their Social Security numbers and other personal information online.

    July 13, 2012
  • The Government Accountability Office assessed the performance of seven federal agencies in migrating some of their services to the cloud as required by the Office of Management and Budget. Five of the seven agencies succeeded in meeting OMB's requirements and the other two are expected to be compliant by year's end.

    July 13, 2012

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.