Advertisement

You will be redirected to the page you want to view in  seconds.

 Cybersecurity

  1. Sen. Tom Carper, D-Del., acknowledged agencies have made progress toward better cybersecurity but need to do more. Staff

    2014 FISMA reduces paperwork, codifies management structure

    Agencies won't have to complete huge three-year reports but will have to submit information on security incidents.

    • Dec. 16, 2014
  2. Philip Reitinger, a former executive with the departments of Homeland Security, Justice and Defense, thinks a central cyber campus is a valuable step. Courtesy Photo

    New campus to centralize cybersecurity workforce

    GSA secures funding for cyber campus for civilian employees.

    • Dec. 15, 2014
  3. The idea for a Senate Cyber Caucus came up during a panel discussion that included Sen. Sheldon Whitehouse, D-R.I., who was in favor of creating a bipartisan group. Office of Sen. Sheldon Whitehouse

    7 Senators to consider for a 'Cyber Caucus'

    An idea for a bipartisan Cyber Caucus in the Senate got us thinking: Who should be tapped?

    • Dec. 10, 2014
  4. DARPA researcher Dr. Angelos Keromytis is program manager for the Transparent Computing initiative, focused on a new way to detect and mitigate advanced persistent threats. DARPA image

    DARPA sees future of cybersecurity in Transparent Computing

    Research agency is soliciting proposals for a holistic, adaptive approach to securing networks.

    • Dec. 8, 2014
  5. A vulnerability in a Mobile Device Management system used by government agencies could allow an attacker to run arbitrary code. U.S. Army photo

    Bug in IBM mobile device manager opens critical security gap

    Vulnerability could give attacker access to all devices on managed network.

    • Dec. 5, 2014
  6. Assistant Attorney General Leslie Caldwell introduced the new Cybersecurity Unit at the Cybercrime 2020 Symposium at Georgetown Law. Georgetown Law

    New DOJ Cybersecurity Unit to advise on Internet crime

    Team of 20-plus lawyers will focus on electronic surveillance and cyber crime.

    • Dec. 5, 2014
  7. GSA is asking industry if it can deliver on advanced technologies like 3D printing. Spencer Platt / Getty Images

    Alliant II managers ask industry for leading-edge tech experience

    Survey queries companies on their expertise in 18 specific technologies, including big data, the Internet of things, artificial intelligence and predictive analytics.

    • Dec. 4, 2014
  8. U.S. Department of Agriculture (USDA) researcher Judith Stasko shows Agriculture Secretary Tom Vilsack and Mexican Minister of Agriculture Enrique Martinez y Martinez during a tour U.S. Department of Agriculture's (USDA's) National Animal Disease Center in Ames, Iowa. on Thursday, October 16, 2014. USDA photo by Darin Leach

    Agriculture research centers connecting to high-speed network

    New Science Network will improve collaboration and big data computing.

    • Dec. 4, 2014
  9. A former scientist with Sandia National Labs was sentenced for bringing a government laptop on a trip to China and lying about it to security officials. Sandia National Labs image

    Sandia scientist gets prison term for taking DOE laptop to China

    Jianyu Huang was indicted in 2012 for using U.S. government equipment to do research for Chinese institutions and lying to officials.

    • Nov. 26, 2014
  10. A former Navy nuclear systems administrator was sentenced Nov. 21 for hacking into restricted systems and releasing personal information of service members. MC2 Gary A Prill/U.S. Navy

    System admin sentenced for hacking Navy database

    Former Navy nuclear systems administrator gets two years for exposing information of 222,000 personnel.

    • Nov. 24, 2014
  11. The State Department is the most recent federal agency to admit to a breach of its cyber networks. Wikimedia Commons

    State Department hit in cyberattack that also compromised White House

    State Department's email system shut down this weekend to shore up affected network.

    • Nov. 17, 2014
  12. Veteran Affairs CIO Stephen Warren noted that all veteran data compromised in October was the result of human error, not cyberattacks. Colin Kelly/Staff

    Cybersecurity about people, not technology, VA numbers show

    Leaks of personally identifiable information are more likely to come through lost devices or mishandled paperwork than hacking attempts.

    • Nov. 17, 2014
  13. A public-private partnership would put NOAA data -- like this weather photo -- in a public cloud. NASA/NOAA satellite image

    NOAA asks industry to fund open data program

    Private sector wants access to the data and is willing to pay to put it in a public cloud.

    • Nov. 14, 2014
  14. Rep. Elijah Cummings, D-Md., sent letters to several private corporations asking for details on recent cyber breaches. Win McNamee/Getty Images

    Rep. Elijah Cummings requests details on private industry data breaches

    Ranking member of Oversight Committee looking for information to help steer government policy.

    • Nov. 12, 2014
  15. U.S. Postal Service networks were breached, potentially leaking significant, sensitive information about employees, as well as some customer data. Kevork Djansezian/Getty Images

    Cyber attack exposes personal information of 800K Postal Service employees

    Intrusion compromised important employee data, including Social Security numbers, and some consumer information.

    • Nov. 10, 2014
  16. OPM seeks to learn the 'DNA of the federal cybersecurity workforce,' says Lucy Antone. SAUL LOEB / AFP/Getty Images

    Cybersecurity codes being added to all federal job descriptions

    OPM looking to have every position coded by the end of 2015.

    • Nov. 7, 2014
  17. An Inspector General review of Energy Department's systems showed persistent cybersecurity issues. Sheila Vemmer/staff

    IG: Energy Department systems exposed by critical weaknesses

    Annual cybersecurity report shows some progress but a number of significant deficiencies.

    • Nov. 4, 2014
  18. A survey of government IT professionals finds that training to prevent cyber security threats is an investment priority for more than 60 percent of federal civilian and defense/military organizations. Fort Meade Alliance

    Survey: Cybersecurity priorities shift to insider threats

    Federal IT decision-makers now more concerned with 'misuse' than malware.

    • Nov. 3, 2014
  19. Press Secretary Josh Earnest said a recent breach of the White House's unclassified network caused minor inconvenience to staffers. Mark Wilson/Getty Images

    White House cyber breach one example of 'daily' attacks

    While no sensitive data was exfiltrated, the incursion underscores importance of constant monitoring.

    • Oct. 30, 2014
  20. DHS Federal Network Resilience Director John Streufert gave a revised timeline for CMD solicitations and awards. Mike Morones/Staff

    Remaining CDM solicitations delayed to December and beyond

    Majority of contract award announcements expected by August.

    • Oct. 23, 2014
  21. Blake Hall (left), founder and CEO of ID.me, and Kimberley Little Sutherland (right), senior director of market planning for identity management for LexisNexis. Photos courtesy ID.me and LexisNexis

    ID management secondary focus of executive order

    Third section of an E.O. on payment cards includes mandates for securing access to citizen data.

    • Oct. 23, 2014
  22. The Galaxy S 5 is one of several Samsung mobile devices approved to handle classified government data. Donald Bowers/Getty Images

    Samsung Galaxy devices approved for classified use

    Galaxy devices are first commercial mobile tech to make the government's classified list.

    • Oct. 22, 2014
  23. New roles at DOJ show cybersecurity, espionage focus

    New position created to direct efforts against state-sponsored cyberwarfare.

    • Oct. 21, 2014
  24. An NOAA employee allegedly downloaded restricted information about the nation's dams. Ethan Miller/Getty Images

    NOAA employee indicted on theft of infrastructure data

    Weather Service hydrologist charged with downloading restricted data on dams.

    • Oct. 21, 2014
  25. 'Operation Deathclick' tricks users into loading malware by disguising itself as an online advertisement. Getty Images/Hemera

    'Operation DeathClick' targets defense contractors

    Cybersecurity analysts suggest attacks on federal systems not far behind.

    • Oct. 17, 2014
  26.  Ciaran Griffin / Getty Images

    Agencies must improve payment card security by year end

    President Obama signed an executive order Friday requiring federal agencies to strengthen card and reader security by Jan. 1.

    • Oct. 17, 2014
  27. Attorney General Eric Holder and Federal Bureau of Investigation Director James Comey were named as plaintiffs in a lawsuit filed by Twitter. AFP/Getty Images

    Twitter files First Amendment lawsuit against DOJ, FBI

    Suit filed Tuesday balks at decision prohibiting the social media company from publishing a report on government surveillance efforts.

    • Oct. 7, 2014
  28. Dr. Joseph JaJa (left) and Dr. Anupam Joshi (right). (USM) University System of Maryland

    Players picked for first federally-funded R&D center for cybersecurity

    MITRE Corp. and University System of Maryland will join NIST to help private industry solve cybersecurity problems.

    • Oct. 7, 2014
  29. NSF awards $31M to build better cyber infrastructure

    The National Science Foundation has announced $31 million in funding to help develop innovative big data and cyber infrastructure projects, according to the agency.

    • Oct. 2, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit industrycircle.com today!

See all Video

Top Video Picks