Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
A special committee of the federal Chief Information Officers Council has publicly unveiled a draft strategy for better securing email. The Information Security and Identity Management Committee of the Chief Information Officers Council first issued the draft report in November, but made it available to the public for the first time last week. The report garnered comments on how agencies can secure their email systems using DNS Security Extensions.
The results of a ForeSee poll also show one-third of the 40 federal websites surveyed already have launched mobile initiatives.
Shared IT services include virtualized services, cloud computing, object reuse, security controls and continuous monitoring, Klimavicz writes in a blog post.
Federal IT professionals are worried most about organized cybercrime and hack-tivism, but said they were least prepared to cope with social media leaks.
Four cybersecurity bills will be considered in the House next week, calling for more coordination in developing unclassified computer networks and in writing cybersecurity standards.
The House of Representatives is expected to take up several cybersecurity bills next week, one of which is aimed at updating the Federal Information Security Management Act. So far, the bill has earned bipartisan support.
The RAT Board is a model for government-wide spending oversight, and bipartisan legislation in both the House and Senate could make the RAT Board a permanent fixture in overseeing federal spending.
Richard Falkenrath, a principal with the Chertoff Group, worries that agencies' information could be in jeopardy from overreaching court authority.
The FBI's former top cyber cop has taken a job with a startup company to help protect private-sector computer networks that he says are already under constant attack with intrusions.
Microsoft researchers says those scary vendor reports warning about the value of cyber crime losses are mostly bunk. That's because they are based on surveys, and surveys are easy to bias.
Speaking at the National Space Symposium in Colorado Springs, Colo., the Air Force's top cyber commander, Maj. Gen. Suzanne Vautrinot, stressed the importance of offense, defense and exploitation when forming cybersecurity strategy.
The software company received more than $357 million in sales from its schedule contract in 2011. GSA's decision affects Oracle's professional services offerings under the IT Schedule 70 Program.
Many forward-thinking enterprises in the government and commercial sectors are using cloud environments to improve scalability, agility, automation, and efficiency. The operating landscape for these organizations is rapidly evolving: Costs are reduced. Data is ubiquitous. Information is flowing from more sources than ever before. However, the same features that create such high promise for the cloud also bring a potential for new levels of criminal exploitation through fraud. A distinguished panel of top experts will look at the new face of fraud in a digital age, provide insights in how to prevent, detect and investigate fraud in the cloud and identify options to combat fraud in the cloud computing world.
The Homeland Security Committee passed the Promoting and Enhancing Cybersecurity and Information Sharing Act.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.