While industry is excited about the Internet of Things, agencies have shown they've been interconnecting systems and applications for years. But the Privacy Act is standing in the government's way to go further, some say.
Data protection using encryption won't buy much unless you design it correctly. Like, keeping the keys away from the encrypted data. It's all in NIST publication 800-57. Look it up.
It might seem like something out of a science fiction novel, but soon travellers might be able to quickly moving through security checkpoints just by showing their hand to a scanner. The National Institute of Standards and Technology is working with industry to bring fast, touchless fingerprint readers out of the lab and into the marketplace. The touchless technology offers unprecedented speed and a hygienic alternative to conventional fingerprint readers. Michael Garris is a Biometric Senior Scientist at NIST. He told the Federal Drive with Tom Temin that the scanners you touch are okay.
We turn next to a project of the National Institute of Standards and Technology. It's working to incorporate data from a federal, personal identification verification card, or PIV card, right into your mobile device. Federal Drive host Tom Temin spoke with the principles on this project. Vernon Lee is the Chief Technical Officer of Microsoft Civilian, Hildy Ferraiolo is a computer scientist at NIST, and Chris Edwards is the CTO at Intercede.
Attorney Bob Metzger with Rogers Joseph O'Donnell, PC, joins host Roger Waldron for a wide ranging discussion of the federal government's cybersecurity policies and regulations including the new DFARS cyber rule. September 15, 2015
Sol Cates, chief security officer for Vormetric, argues that while new policies and regulations are important, the answer to an organization’s cybersecurity problems starts with making a decision to dedicating more resources to solutions and less to filling out forms.
A real revolution is what Nobel Prize Laureate and fellow at the National Institute of Standards and Technology William Phillips calls the field of atomtronics. He applauded the work of NIST physicist Gretchen Campbell in that field. Campbell is a Service to America Medal finalist in the Call to Service category. She says the field of atomtronics is still sort of theoretical.
COMMENTARY: Ron Gula, the CEO of Tenable Network Security, makes the case for CIOs not to get overwhelmed by all the security rules and requirements and instead to focus on a few areas that can make a big difference.
The Office of Management and Budget just released new guidance on protecting non-sensitive information from federal contractors. The guidance would require contractors follow National Institute for Standards and Technology standards for protecting their information.
Federal contractors have new guidance for protecting government information from the CIO and CAO Councils. Contractors will have to comply with some of the same standards agencies do. Jeremy Grant is managing director at the Cheroff Group and former director of the National Strategy for Trusted Identities in Cyberspace at NIST. He tells In Depth with Francis Rose what this means for contractors who will have to comply with these NIST standards.
New guidance on protecting non-sensitive information from federal contractors is out from the CIO and CAO Councils. It would require that contractors follow a specific NIST Special Publication for protecting their information. The Office of Management and Budget is asking agencies and vendors now for feedback. Final guidance is expected later in the fall. Nick Nayak is former chief procurement officer at the Homeland Security Department. He tells In Depth with Francis Rose that the councils are looking to address incident reporting, information system assessments, and information security continuous monitoring.
The National Institute of Standards and Technology produces prodigious amounts of data. Now it wants your help to make that data more accessible. NIST has launched a contest to create and design an app using some of its data sets. Heather Evans is a challenge manager at NIST. She joined the Federal Drive with Tom Temin with more on the contest.
The Office of Management and Budget is working on new cybersecurity guidelines for contractors in the wake of two major breaches. Contractors already have five major expectations for their own cyber programs from the National Institute of Standards and Technology. Larry Allen is president of Allen Federal Business Partners and writes the Week Ahead newsletter. He tells In Depth with Francis Rose that your company can't get into the cybersecurity game without perfecting and securing its own network first.
People use mobile devices for almost everything nowadays — sometimes even for viewing sensitive information. It's not just the intelligence community that needs to keep its devices protected. Medical providers need a middle ground between security and convenience as well. To that end, the National Cybersecurity Center of Excellence has released a new set of rules to help health care providers keep their mobile devices as secure as possible. Gavin O'Brien is a project manager at NCCoE. He joined Tom Temin on the Federal Drive to review the new guidelines.
The breaches of the Office of Personnel Management's networks underscore how vulnerable the government is to hackers. Every federal employee can strengthen or weaken the government's cybersecurity. Federal News Radio's Emily Kopp asked two experts to share some tips for being safe online during a training conference hosted by Gov Loop. The first voice you'll hear is Kristina Dorville, the Homeland Security Department’s branch chief for cyber education and awareness. We'll also hear from Celia Paulsen, an IT security specialist at the National Institute of Standards and Technology.