Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
The FBI's Criminal Justice Information Services says local law enforcement needs to encrypt its data if it wants to join the cloud. The FBI said when information is encrypted from the start, police can have control of its cybersecurity on any cloud system, according to a post on InfoSecurity.
The technology is based on Microsoft's Kinect, used in the XBox video gaming system, and now it's the basis of new tools developed by the State Department's Office of eDiplomacy. State showcased their innovation this week at the FOSE Conference in Washington.
Federal agencies may be behind the times when it comes to "bring your own device" programs for employees, but federal contractors have been doing it for years. Sheila Jordan from Cisco told the Federal Drive about her company's program, security concerns and benefits beyond savings.
Several advocacy groups have raised major civil-liberties concerns about pending cybersecurity legislation, claiming the language may unfairly expose personal information and punish those who hide it.
Microsoft received 20 submissions in a contest to come up with new security technologies. The company's Blue Hat Prize will pay the winner $200,000.
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
The Defense Department says it's fast-tracking the construction of an infrastructure that will support future mobile devices in the military. A network that can securely support Apple and Android devices should be fully up and running by next year, while a secure app store will be online within a couple months.
A federal utility powering a third of the Pacific Northwest is vulnerable to computer breaches. An Energy Department audit found the Bonneville Power Administration, which services hospitals, banks, and critical military installations accounts for 30 percent of the region's power.
While Congress debates several new cybersecurity bills, a Congressional Research Service reports shows the government is already involved in regulating cybersecurity.
Jim Harper, senior policy analyst at the conservative Cato Institute, says that some of the cybersecurity bills Congress is considering are overreaching and may be unnecessary in the long run.
Federal CIO Steven VanRoekel wants agencies to cut spending and invest in new capabilities at the same time. Savings from outdated or inefficient IT projects can be plowed into new innovations, he said.
Latisys CEO Peter Stevenson explains how his company can help your agency or business move to the cloud. April 3, 2012
"Drive-by" malware infected more than ten million computers in February, according to a statistical analysis by Barracuda Labs. "Drive-by" malware describes files that people download from a site without knowing where it came from or what it really does.
The cybersecurity response center at the IRS is mostly working, according to a new report from the Treasury Inspector General for Tax Administration. However, in the report, Treasury Inspector General J. Russell George said that the Computer Security Incident Response Center isn't reporting every computer security incident as it's supposed to.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.