Cybersecurity

  • While the threat of a Sept. 11-style attack may not be as great, terrorism, either of the lone-wolf or state-sponsored variety, still poses a threat to the U.S. Agencies are moving to protect themselves in areas such as cybersecurity.

    September 11, 2013
  • Terry Gudaitis , owner/principal of Mindstar Security discusses how social media impacts security at your agency. September 10, 2013

    September 10, 2013
  • The Office of the Director of National Intelligence said the lead agencies under the IC IT Enterprise program launched a standard desktop, a secure community cloud and an apps store in mid-August. Al Tarasiuk, the assistant DNI and intelligence community chief information officer, said the key to this effort was having an ICwide agreed-upon security architecture and policies.

    September 10, 2013
  • The Department of Energy first reported in August 14,000 current and former employees had their Personally Identifiable Information stolen. The department now says that number is nearly four times what it had originally thought.

    September 05, 2013
  • The Defense chief information officer is expected to update one directive to expand the number and type of devices that must meet the military's cybersecurity requirements. The Pentagon also will issue a second revised directive to move DoD closer to civilian agencies around risk management of IT systems.

    August 22, 2013
  • Eight cutting-edge technologies developed by the government are being shown off this week to venture capitalists and investors in Silicon Valley, with the hope of attracting someone to take the applications to market.

    August 21, 2013
  • Phyllis Schneck is the new deputy undersecretary of cybersecurity in the National Protection and Programs Directorate at DHS. She replaces Mark Weatherford, who left in April.

    August 19, 2013
  • The Energy Department confirmed 14,000 current and former employees are at risk of identity theft as cyber attackers gained access to their personal information. This is at least the second hacking incident this year.

    August 16, 2013
  • The director of the Defense Information Systems Agency says the agency will spend the next year focusing on a faster, more agile acquisition process to accelerate the way it delivers technology, rather than letting procurements drag on for years.

    August 15, 2013
  • Recent revelations about secret U.S. surveillance programs could significantly impede progress on negotiations over new laws and regulations meant to beef up the country's defenses against the growing threat of cyber-attacks. Current and former cyber security officials say they worry the ongoing disclosures about secret National Security Agency spying programs by former NSA contractor Edward Snowden could trigger knee-jerk reactions by Congress or the private sector.

    August 13, 2013
  • How does DHS detect and respond to malicious cyber activity. DHS also operates a cyber-information coordination center, the National Cybersecurity and Communications Integration Center (NCCIC), and several operational units. These units respond to incidents and provide technical assistance to information system operators. The NCCIC coordinates the information collected through these channels to create a common operating picture for cyber communities across all levels of government and the private sector.

    August 13, 2013
  • How do you know if your computer is vulnerable to cyber-attack? USCERT The U.S. Computer Emergency Readiness Team. says many computers are sold with software already loaded. Whether installed by a computer manufacturer, operating system maker, Internet Service Provider, or by a retail store, USCERT says the first step in assessing the vulnerability of your computer is to find out what software is installed and how one program will interact with another. Unfortunately, it is not practical for most people to perform this level of analysis.

    August 13, 2013
  • What is DHS's role in cyber security. DHS uses intrusion detection tools to monitor .gov network traffic for malicious activity and uses this resulting data to address cyber vulnerabilities. In addition, DHS issues bulletins and alerts that provide information on potential cyber threats. Last year, DHS issued more the 5,000 alerts and advisories, which it shared with various government, private sector, and critical infrastructure stakeholders; as well as the public.

    August 13, 2013
  • Cyber criminals --what's their M.O.? USCERT says Attackers focus on exploiting client-side systems (your computer) through various vulnerabilities. They use these vulnerabilities to take control of your computer, steal your information, destroy your files, and use your computer to attack other computers. A low-cost way attackers do this is by exploiting vulnerabilities in web browsers. An attacker can create a malicious web page that will install Trojan software or spyware that will steal your information.

    August 13, 2013

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.