Cybersecurity

  • We’ve been telling you about the White House report on cyberspace policy and the cyber security review. The report was based on that 60-day top-to-bottom review of cybersecurity and was conducted by the National Security…

    June 02, 2009
  • The Air Force once again is leading the federal effort to address some obvious cybersecurity gaps. The service and Microsoft teamed up to develop secure server configurations for Windows servers. This work comes about two…

    May 18, 2009
  • The Homeland Security Department’s Science and Technology Directorate is playing matchmaker between systems integrators and up-and-coming companies. The goal is to get cutting-edge cybersecurity technology into the government as quickly as possible. This is part…

    May 14, 2009
  • The House Oversight and Government Reform Committee will add its two cents to the growing number of bills addressing federal cybersecurity. Lawmakers at a hearing today offered a glimpse of what the new bill could…

    May 05, 2009
  • When they talk, people listen. That’s the result of a survey of federal chief information security officers. The survey was conducted by (ISC)2 and CISCO and Government Futures. We talk about the survey with (ISC)2…

    April 30, 2009
  • When an employee keeps passwords on a sticky note attached to his computer screen, that could be a sign that your agency needs a better password policy.

    April 29, 2009
  • CIO Council offers advice on improving agency input on IT security

    April 21, 2009
  • As early as this Friday, President Obama is expected to receive a the results of a top-to-bottom review of the nation’s cybersecurity program. The president ordered the review 60 days ago and is expected to…

    April 15, 2009
  • Survey finds bigger cybersecurity lapses at smaller agencies.

    April 13, 2009
  • Employees may be one of the real risks to cybersecurity in your organization. A survey by Applied Research and Symantec shows that human error and deliberate sabotage cause large amounts of data to be lost…

    April 13, 2009
  • The National Institutes of Standards and Technology is updating a nearly four-year-old publication that guides how agencies protect their computer networks. NIST is trying to help agencies battle the changing nature of the cyber threat…

    April 10, 2009
  • Looking at real threats in an ether-based world

    April 10, 2009
  • How secure are the 98,000 desktop and laptop computers at the Internal Revenue Service? Peggy Begg is the Assistant Inspector General for Security and Information Technology Audits with the Treasury Department. She joins us to…

    April 08, 2009
  • Once again, the world of networked computers held its collective breath last week. Would the Confickr worm morph on April Fool’s Day into real malware? It did not. Why not? Probably for a couple of…

    April 02, 2009

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.