Close
MORE NEWS
Headlines

Updated 4:24 p.m. EDT

  • Grid
  • List
Cybersecurity

The user knows nothing: Rethinking cybersecurity

The user knows nothing: Rethinking cybersecurityTrue cybersecurity requires a new way of thinking — an Inverse Shannon's Maxim.
  • Cybersecurity
  • 1 week, 3 days ago
Cybersecurity

DHS RFP will ask for cybersecurity research support

DHS RFP will ask for cybersecurity research supportSolicitation for Cybersecurity Research and Technical Execution Support expected in next two weeks.
  • Cybersecurity
  • 1 week, 1 day ago
Cybersecurity

$39M CDM contract awarded for six major agencies

$39M CDM contract awarded for six major agenciesSix major agencies will get continuous monitoring services under the DHS-led program.
  • Cybersecurity
  • 1 week, 1 day ago
CLOUD

GSA seeking new digital identity credential model

GSA seeking new digital identity credential modelThe development would be in support of the Connect.Gov program, formerly known as the Federal Cloud Credential Exchange.
  • CLOUD
  • 18 hours, 6 minutes ago
Cybersecurity

Carter to unveil new Pentagon cyber strategy

Carter to unveil new Pentagon cyber strategyCarter to unveil new Pentagon cyber strategy
  • Cybersecurity
  • 2 days, 10 hours ago
Enterprise View

Coast Guard Commandant: Establishing the cyber rules of engagement

Coast Guard Commandant: Establishing the cyber rules of engagementAdmiral Paul Zukunft explains the Coast Guard's cyber strategy in an age of constricted budgets.
  • Enterprise View
  • 1 week, 3 days ago
Cybersecurity

This Week in Federal Times - Cybersecurity: A pivot to offense?

This Week in Federal Times - Cybersecurity: A pivot to offense?An evolution of thinking is underway in response to cyber threats.
  • Cybersecurity
  • 2 weeks ago
IT MANAGEMENT

NIST offers guidance on securing the tech supply chain

NIST offers guidance on securing the tech supply chainWith less visibility into the technology being bought and deployed, agencies need a plan to ensure security of commercial products.
  • IT MANAGEMENT
  • 2 weeks ago
Cybersecurity

FBI warns of fake government website scams

FBI warns of fake government website scamsSites purporting to offer government services are stealing users' personal information.
  • Cybersecurity
  • 2 weeks, 3 days ago
Cybersecurity

CNN: Russians hacked White House computers

CNN: Russians hacked White House computersRussian hackers penetrated the White House's computer system and gained access to information including private details of President Obama's schedule, according to a report by CNN Tuesday.
  • Cybersecurity
  • 2 weeks, 3 days ago
CLOUD

FedRAMP wants to merge cloud, trusted Internet guidelines

FedRAMP wants to merge cloud, trusted Internet guidelinesComments on draft document open through May 2.
  • CLOUD
  • 2 weeks, 4 days ago
FEDERAL IT

Ed Department seeking Info Assurance Director, CISO

Ed Department seeking Info Assurance Director, CISODepartment of Education has an opening for a policy and security director working under the CIO.
  • FEDERAL IT
  • 2 weeks, 4 days ago
Cybersecurity

President Obama’s executive order explained

President Obama’s executive order explainedWhat the new executive order means.
  • Cybersecurity
  • 3 weeks, 2 days ago
Cybersecurity

Obama signs order authorizing sanctions against cyber criminals

Obama signs order authorizing sanctions against cyber criminalsNew executive order enables sanctions against individuals, not just just nations and organizations.
  • Cybersecurity
  • 3 weeks, 2 days ago
MOBILITY

Agencies need BYOD policies before issues arise

Agencies need BYOD policies before issues ariseSome loose guidance is available but few agencies have a fleshed out policy for use of personal devices.
  • MOBILITY
  • 3 weeks, 3 days ago
Procurement Policy

DoD's Better Buying Power to add cyber

DoD's Better Buying Power to add cyberA draft version of the document lacked cyber as a category. Frank Kendall promises the final version will address
  • Procurement Policy
  • 3 weeks, 4 days ago
DHS Blog

Momentum builds for analytics-driven security

Momentum builds for analytics-driven securityDHS's Trusted Traveler programs are enhancing security, increasing system-wide efficiency.
  • DHS Blog
  • 4 weeks ago
Cybersecurity

NIST: Create checklists to ensure app security, compliance

NIST: Create checklists to ensure app security, complianceNew draft guidance helps developers create checklist of security controls for new IT products.
  • Cybersecurity
  • 4 weeks ago
More Cyber security News

Updated 4:24 p.m. EDT

  • Grid
  • List
CLOUD

First cloud collaboration software gets FedRAMP approval

First cloud collaboration software gets FedRAMP approvalCollaboration software-as-a-service from Huddle gets ATO from USAID.
  • CLOUD
  • 1 month ago
SOLUTIONS AND IDEAS

Beyond BYOD Security: Plugging the Data Governance Gap

Beyond BYOD Security: Plugging the Data Governance GapThis lapse in data oversight can have serious consequences
  • SOLUTIONS AND IDEAS
  • 1 month ago
FEDERAL IT

Report: Agencies not analyzing half of video data

Report: Agencies not analyzing half of video dataMore collaboration between IT and security departments and stronger infrastructure are needed to meet demand.
  • FEDERAL IT
  • 1 month, 1 week ago
CIOS

Brig Gen: Military CIOs should have operational focus

Brig Gen: Military CIOs should have operational focusAs IT management and the cyber mission align, military CIOs should be doing the same.
  • CIOS
  • 1 month, 1 week ago
Cybersecurity

FedRAMP approves first SaaS cybersecurity product

FedRAMP approves first SaaS cybersecurity productHP's Fortify on Demand obtained the first security software-as-a-service approval on FedRAMP.
  • Cybersecurity
  • 1 month, 1 week ago
Cybersecurity

Coast Guard cyber plan to focus on ports, shipping

Coast Guard cyber plan to focus on ports, shippingThe strategy, coming soon, will outline authorities and requirements for shipping firms and port facilities.
  • Cybersecurity
  • 1 month, 1 week ago
SOLUTIONS AND IDEAS

How automated threat response can close the cyber gap

How automated threat response can close the cyber gapIT security has changed from a recognized (if often neglected) concern to a hot button three-alarm fire.
  • SOLUTIONS AND IDEAS
  • 1 month, 2 weeks ago
CLOUD

Early comments provide focus for FedRAMP high baseline

Early comments provide focus for FedRAMP high baselineTake a first look at what agencies and industry are saying about the new security level for cloud.
  • CLOUD
  • 1 month, 2 weeks ago
IT MANAGEMENT

CIA reorganizing to meet cyber threats

CIA reorganizing to meet cyber threatsThe nation's intelligence arm is modernizing with a new directorate and corporate structure.
  • IT MANAGEMENT
  • 1 month, 2 weeks ago
Cybersecurity

Clinton email flap highlights issues of shadow IT

Clinton email flap highlights issues of shadow ITManaging the use of unauthorized apps and devices is a critical cybersecurity concern.
  • Cybersecurity
  • 1 month, 3 weeks ago
Cybersecurity

CDM rollout to accelerate through 2015

CDM rollout to accelerate through 2015Expect more awards and the first operational systems by the end of the year.
  • Cybersecurity
  • 1 month, 3 weeks ago
Cybersecurity

Video: GSA solutions for cybersecurity

Video: GSA solutions for cybersecurityActing director for Strategic Solutions and Security outlines GSA offerings to meet cybersecurity needs.
  • Cybersecurity
  • 1 month, 3 weeks ago
Cybersecurity

FISMA report shows feds weak on user authentication

FISMA report shows feds weak on user authenticationAnnual cybersecurity review highlights need for stronger identity and access controls.
  • Cybersecurity
  • 1 month, 3 weeks ago
Cybersecurity

Second set of CDM task orders awarded

Second set of CDM task orders awardedAwards released for task order 2A, covering Homeland Security and its component agencies.
  • Cybersecurity
  • 1 month, 3 weeks ago
Cybersecurity

Cyber: Not a 'nerd topic'

Cyber: Not a 'nerd topic'Phyllis Schneck, DHS Deputy Under Secretary of NPPD, on building cyber awareness
  • Cybersecurity
  • 1 month, 3 weeks ago
Cybersecurity

Schneck: Congress should pass administration's cyber legislation

Schneck: Congress should pass administration's cyber legislationPhyllis Schneck explains what cyber legislation needs to do.
  • Cybersecurity
  • 1 month, 3 weeks ago
DHS

DHS explores the requirements of cyber insurance

DHS explores the requirements of cyber insurancePhyllis Schneck, DHS Deputy Under Secretary NPPD, on what it takes to offer cyber insurance.
  • DHS
  • 1 month, 3 weeks ago
Cybersecurity

Phyllis Schneck: Where Cyber is now.

Phyllis Schneck: Where Cyber is now.Phyllis Schneck DHS Deputy Under Secretary NPPD, on Where Cyber is now?
  • Cybersecurity
  • 1 month, 3 weeks ago