T.K. Keaninni, chief technology officer for nCircle joins host John Gilroy to talk about how his company can help your agency with its network security issues. June 26, 2012
NIST, DHS experts say protecting smartphones and tablets shouldn't be any different than securing typical desktop or laptop computers. DHS will release mobile security reference architecture to help agencies understand common concepts. NIST is updating security control guide with 250 new requirements, including mobile controls.
The White House, Congress, DoD and many others are trying to stem the tide of counterfeit products and software with malicious code from entering federal systems. The administration soon will release recommendations for how all agencies and vendors can improve the security of their products. DoD issued a memo in March requiring changes to how services protect their supply chains.
The group will create a white paper with recommendations this summer to modernize the 10-year-old policy. Among the areas they are looking at are continuous monitoring, cloud computing, shared services and the definition of a system. Updating A-130 will help agencies move from a 'checklist' mode to monitoring systems in real time for threats and vulnerabilities, said Frank Reeder, a former OMB official.
The Industry Botnet Group — coordinated by the White House Cybersecurity Office and the Departments of Commerce and Homeland Security — has posted nine principles, including coordination of cyber responsibilities across sectors and reporting lessons learned.
The House approved the first spending bill for 2013, setting operating budgets for the Commerce and Justice Departments and for science-related agencies, such as NASA.
The Manufacturing Extension Partnership has a goal of making U.S. manufacturers more competitive.
A working group is developing common requirements for a federated cloud identity management shared service. NIH already showed how this could be done with its iTrust tools. The tiger team is expected to issue the common standards in the next few months.
Digital signatures are mathematical algorithms that ensure authenticity of digital documents. They are specified in Federal Information Processing Standard, or FIPS 186 — 3. The standard first came out in 1994.
GSA, NIST to name the first batch of outside organizations who will test and validate commercial cloud products against baseline security standards in the FedRAMP cloud security program in May. The Joint Authorization Board also will release guidance to industry on how to implement the security requirements in the coming months. FedRAMP still is months from approving its first set of vendors.
National Institute of Standards and Technology wants comments about revisions to FIPS 186-3. NIST said the proposed revision includes clarifications, corrections and revisions
The National Institute of Standards and Technology has asked for comments about its proposed revisions to the Digital Signatures Standard.
The Morning Federal Newscast is a daily compilation of the stories you hear Federal Drive hosts Tom Temin and Amy Morris discuss throughout the show each day. The Newscast is designed to give FederalNewsRadio.com users more information about the stories you hear on the air.
With the release of the draft of version 1 of the cloud technology roadmap, the agency wants to cast a wider net of cloud expertise. The draft roadmap could be used now by program managers and CIOs in order to meet OMB\'s goal of moving three services to the cloud by 2013.
Billions being paid to beef up smart grid to make sure its cyber-secure.