Cybersecurity

  • The fast-growing number of devices connected to the Internet means enterprises need to rethink their approaches to cybersecurity. Cyber expert Melissa Hathaway says we're at a cyber inflection point. She's the president of Hathaway Global Strategies and former director of the Joint Interagency Cyber Task Force. She joined Tom Temin on the Federal Drive to discuss the top concerns for cybersecurity.

    August 18, 2014
  • The service will test out a role-based authentication technology on an application in the MilCloud run by DISA. Frank Konieczny, the Air Force's chief technology officer, said the pilot could move into full production in six months. DoD is considering adding the role-based capability to the JIE framework.

    August 15, 2014
  • The Army has thousands of personnel working full-time on cyber, but so far, those soldiers have no dedicated career path. That may be about to change.

    August 15, 2014
  • Gary Wyckoff, the chief information officer of the Office of Naval Research, said ONR is on the cusp of putting several applications in the cloud. He said mobility is a more difficult road to travel.

    August 14, 2014
  • Terry Halvorsen, DoD's acting chief information officer, is planning to change the way the military uses and manages its network. The Joint Information Environment is driving many of the modernization efforts across DoD.

    August 14, 2014
  • A large chunk of the government IT workforce that's charged with implementing the Homeland Security Department's new continuous diagnostics and mitigation initiative still doesn't know much about it. The lack of awareness is most acute with agency inspectors general. But those that have pressed forward with CDM say their networks have already become more secure or less costly.

    August 13, 2014
  • Executive Editor Jason Miller looks at the news and information you may have missed or that slipped through the cracks at conferences, hearings and the like.

    August 08, 2014
  • Back in 2012, then-defense secretary Leon Panetta warned of a catastrophic cyber attack that could cripple an entire nation or its military. He called it a cyber Pearl Harbor. It was emblematic of a lot of the conventional wisdom that's built up around cyber warfare over the past decade or so. In a recent op-ed, Jay Healey challenges some of that conventional wisdom. Healy is director of Cyber Statecraft Initiative at the Atlantic Council. On In Depth with guest host Jared Serbu, he argued not only is deterrence possible in cyberspace, it's been a reality for a couple decades now.

    August 08, 2014
  • Quite a number of insider threat incidents have happened because basic security principles were absent, overlooked or ignored. Why Jim Henderson says it's time we get back to the basics.

    August 05, 2014
  • With 50 billion devices connected to the Internet, the rules of cybersecurity are changing. Agencies and more companies are on to the importance of cybersecurity, but they might be watching out for high-profile threats rather than more common and stealthy problems that can do lots of damage. That's what Cisco has found and will release in a report. Levi Gundert is the technical lead for Cisco's Threat Research, Analysis and Communications, or TRAC. He spoke with Tom Temin and Emily Kopp on the Federal Drive.

    August 04, 2014
  • Federal websites will have to become more secure if Congress gets its way. Under a bill recently passed by the House, any new federal websites that collect personally identifiable information will need to be deemed secure by the agency's chief information officer before they go live to the public.

    August 04, 2014
  • Federal employees are a prime target for hackers and other bad guys when on vacation. Learn 12 tips for keeping you and your federal-issued laptop safe while out of the office this summer.

    August 01, 2014
  • Federal employees are prime targets for hackers. If not properly secured, the computers and mobile devices they carry could open up their agency's network to malicious attacks. Devices can be especially vulnerable when you're on vacation and it's easy to let your guard down. Jerry Irvine is the chief information officer and a partner of Prescient Solutions. He told Tom Temin and Emily Kopp on the Federal Drive what feds should be aware of when they're traveling.

    July 31, 2014
  • This fall, five more schools will offer an intensive science, technology, engineering and math (STEM) education track to students who are serious about federal cybersecurity careers. These Centers of Academic Excellence are overseen jointly by the National Security Agency and the Homeland Security Department. Schools have to pass a meticulous screening process to qualify for the program. Steve LaFountain is dean of the NSA's College of Cyber. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss the new move.

    July 31, 2014

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.