Advertisement

You will be redirected to the page you want to view in  seconds.

 Cyber

  1. Sen. Tom Carper, D-Del., acknowledged agencies have made progress toward better cybersecurity but need to do more. Staff

    2014 FISMA reduces paperwork, codifies management structure

    Agencies won't have to complete huge three-year reports but will have to submit information on security incidents.

    • Dec. 16, 2014
  2. Philip Reitinger, a former executive with the departments of Homeland Security, Justice and Defense, thinks a central cyber campus is a valuable step. Courtesy Photo

    New campus to centralize cybersecurity workforce

    GSA secures funding for cyber campus for civilian employees.

    • Dec. 15, 2014
  3. The General Services Administration wants to know what metrics to use in assessing vendors' ability to deliver on information security and integrity. Staff

    GSA developing vendor IT security assessments

    RFI asks industry for advice on how government should rate companies for information security.

    • Dec. 15, 2014
  4. An FBI profiling team is turning its attention to insider threats. WikiPedia

    FBI profilers look for insider threats

    A unit of the bureau is studying the technological tools that might help find problematic employees before they cause harm.

    • Dec. 11, 2014
  5. The idea for a Senate Cyber Caucus came up during a panel discussion that included Sen. Sheldon Whitehouse, D-R.I., who was in favor of creating a bipartisan group. Office of Sen. Sheldon Whitehouse

    7 Senators to consider for a 'Cyber Caucus'

    An idea for a bipartisan Cyber Caucus in the Senate got us thinking: Who should be tapped?

    • Dec. 10, 2014
  6. DARPA researcher Dr. Angelos Keromytis is program manager for the Transparent Computing initiative, focused on a new way to detect and mitigate advanced persistent threats. DARPA image

    DARPA sees future of cybersecurity in Transparent Computing

    Research agency is soliciting proposals for a holistic, adaptive approach to securing networks.

    • Dec. 8, 2014
  7. A vulnerability in a Mobile Device Management system used by government agencies could allow an attacker to run arbitrary code. U.S. Army photo

    Bug in IBM mobile device manager opens critical security gap

    Vulnerability could give attacker access to all devices on managed network.

    • Dec. 5, 2014
  8. Assistant Attorney General Leslie Caldwell introduced the new Cybersecurity Unit at the Cybercrime 2020 Symposium at Georgetown Law. Georgetown Law

    New DOJ Cybersecurity Unit to advise on Internet crime

    Team of 20-plus lawyers will focus on electronic surveillance and cyber crime.

    • Dec. 5, 2014
  9. Kevin R. Smith is a senior program manager at Integrity Management Consulting. Courtesy

    Making the business case for cybersecurity

    Even with the growing cyber threat, agencies are being asked to defend their IT portfolios and adapt new technologies in order to reduce IT spending.

    • Dec. 1, 2014
  10. A former scientist with Sandia National Labs was sentenced for bringing a government laptop on a trip to China and lying about it to security officials. Sandia National Labs image

    Sandia scientist gets prison term for taking DOE laptop to China

    Jianyu Huang was indicted in 2012 for using U.S. government equipment to do research for Chinese institutions and lying to officials.

    • Nov. 26, 2014
  11. The Defense Department's new cloud strategy, charting a course now that DISA is no longer the cloud broker, has been delayed. Army

    New DoD cloud policy delayed to early December

    Policy will speed cloud procurement while clarifying the roles of DISA and Office of the CIO.

    • Nov. 25, 2014
  12. A former Navy nuclear systems administrator was sentenced Nov. 21 for hacking into restricted systems and releasing personal information of service members. MC2 Gary A Prill/U.S. Navy

    System admin sentenced for hacking Navy database

    Former Navy nuclear systems administrator gets two years for exposing information of 222,000 personnel.

    • Nov. 24, 2014
  13. Mark Norton (left), DoD senior systems engineer, said derived credentials won't replace CAC but will simplify sending secure emails on mobile devices. Thomas Brown/Gannett Government Media Corp

    Derived credentials to roll out across DoD by July 2015

    The credentials allow mobile devices to send secure emails without need for a common access card to authenticate the user.

    • Nov. 21, 2014
  14. Goodrich

    Microsoft 365 first cloud email to gain FedRAMP approval

    With ATO, partner InfoReliance will start migrating Health and Human Services' email to the cloud.

    • Nov. 21, 2014
  15. Phase II of the Continuous Diagnostics and Mitigation program builds on the identity, credential and access management side of cybersecurity, including personal identity verification cards (shown) and authentication. Kendra Fulton/ / Air Force

    CDM Phase II centers on monitoring user privileges, activities

    'Least privilege and infrastructure integrity' is the watchword for the latest cybersecurity push.

    • Nov. 17, 2014
  16. The State Department is the most recent federal agency to admit to a breach of its cyber networks. Wikimedia Commons

    State Department hit in cyberattack that also compromised White House

    State Department's email system shut down this weekend to shore up affected network.

    • Nov. 17, 2014
  17. Veteran Affairs CIO Stephen Warren noted that all veteran data compromised in October was the result of human error, not cyberattacks. Colin Kelly/Staff

    Cybersecurity about people, not technology, VA numbers show

    Leaks of personally identifiable information are more likely to come through lost devices or mishandled paperwork than hacking attempts.

    • Nov. 17, 2014
  18. Rep. Elijah Cummings, D-Md., sent letters to several private corporations asking for details on recent cyber breaches. Win McNamee/Getty Images

    Rep. Elijah Cummings requests details on private industry data breaches

    Ranking member of Oversight Committee looking for information to help steer government policy.

    • Nov. 12, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit industrycircle.com today!

See all Video

Top Video Picks