It could take up to four months before some security firm is signed up to sort out (one hopes) the multiple messes caused by the cyber breaches earlier this year. The government has promised to provide protection to those impacted. That raises some questions for Senior Correspondent Mike Causey. How long will the protection last?
The commander of US Cyber Command says he wants to create an effective early warning system for cyberspace – potentially ringing alarm bells when foreign adversaries are preparing attacks on government, or even private networks. But to do it, he says he needs more voluntary sharing of cyber threat information between the federal government and commercial companies. More from Federal News Radio’s DoD reporter Jared Serbu.
OPM’s recent cybersecurity breach shows how tight budgets, limited expertise and cultural blind spots create perfect storms of agency vulnerability throughout the federal environment.
A hacker group called Lizard Squad finds a backdoor into federal computer networks. It’s leveraging university supercomputers that also have access to government data. Jonathan Katz is director of the Maryland Cybersecurity Center at the University of Maryland. On In Depth with Francis Rose, be broke down the different ways hackers like Lizard Squad can penetrate your agency’s network.
CENTCOM’s Twitter and YouTube accounts are back up and running after Islamic State sympathizers hacked the sites yesterday. The Defense Department says the attack lasted for about 30 minutes. The sites posted threatening messages about American troops and showed pro-Islamic State images. Retired Navy Rear Adm. Jamie Barnett is a partner for the cybersecurity practice at Venable. On In Depth with Francis Rose, he explained what the cybervandalism means for CENTCOM and national security.
This fall, five more schools will offer an intensive science, technology, engineering and math (STEM) education track to students who are serious about federal cybersecurity careers. These Centers of Academic Excellence are overseen jointly by the National Security Agency and the Homeland Security Department. Schools have to pass a meticulous screening process to qualify for the program. Steve LaFountain is dean of the NSA’s College of Cyber. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss the new move.
Agencies are getting smarter about cyber. The Homeland Security Department and General Services Administration are fine-tuning a contracting vehicle for tools that let agencies not only monitor their computer networks 24/7, but also fix things that go wrong. The umbrella term for the tools is continuous diagnostics and mitigation (CDM). Xceedium is a supplier of CDM software products. Ken Ammon, the chief strategy officer of Xceedium, told Federal Drive hosts Tom Temin and Emily Kopp what’s in store for phase two of CDM.
The bill would conform, mostly, with the House’s most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.
HHS is using big data to improve the cybersecurity of their systems, but also using a layered approach to protect the information. Commerce wants to improve the governance and usability of its data. USDA is creating a big data strategy.
The FRTIB awarded Science Applications International Corporation (SAIC) a five-year, $224.5 million contract. SAIC beat out several competitors including incumbent Serco.