Smarter Gov Tech, Stronger MerITocracy

The consequences of the health care industry doing nothing more to combat cyberattacks could be life or death for many affected patients, according to medical cybersecurity experts testifying before the House Energy and Commerce Committee on Tuesday. […]

The division between Internet of Things developers and IT and cybersecurity experts is one of the core problems in securing IoT devices, according to government and industry experts. […]

cybersecurity

To meet today’s cybersecurity threats, and those that experts predict will pop up in the near future, government agencies will have to do more than just meet compliance guidelines, according to current and former government officials. […]

President Donald Trump extended an Obama-era executive order Wednesday that established a national emergency used as a basis for freezing the assets of Russians tied to a hacking campaign aimed at disrupting the presidential election. […]

After the huge success of the Hack the Pentagon bug bounty program, members of the Department of Defense and participating organizations are calling on other government agencies to copy the DoD program to improve cybersecurity. […]

The Department of Homeland Security offers cybersecurity services to states and other Federal agencies. However, the agency’s cyber systems are not exercising their full potential, the Government Accountability Office found. […]

Federal agencies need more help from IT groups within government and from the private sector to mitigate cybersecurity threats, according to Grant Schneider, acting Federal chief information security officer at the Office of Management and Budget. […]

The Department of Homeland Security’s compliance-based approach will shift to an individualized assessment of components’ threat posture, according to Danny Toler, acting assistant secretary for DHS’s Office of Cybersecurity and Communications. Instead of relying on a “three-ring binder” approach, which standardizes cybersecurity requirements throughout an agency, Toler said DHS will appraise its entities’ cyber stances […]

Focusing solely on cybersecurity practices to prevent breaches won’t result in the security that government agencies need, according to Dale Meyerrose, former CIO and information sharing executive for the U.S. Intelligence Community. […]

There are strong signals that President Donald Trump’s executive order on cybersecurity may still be weeks, if not months, away from hitting the street in final form. After leaking two draft versions in rapid succession, the White House finds itself struggling to define the metrics it will use to hold agency leaders accountable. […]

Only one Federal agency achieved the highest scores in each of the cybersecurity framework areas in the Federal Information Security Management Act report for fiscal year 2016. The Federal Election Commission, which governs the financing of Federal elections, received top scores for identifying, protecting, detecting, responding, and recovering from cybersecurity incidents. […]

Sens. Tim Kaine, D-Va., and Mike Rounds, R-S.D., introduced a bill on Thursday that would authorize the Department of Defense scholarship fund to receive $10 million for fiscal year 2018 and would enable them to expand scholarships for associate degrees in cybersecurity. […]

Organizations will be able to alert one another about incoming distributed denial of service attacks through one network “sooner rather than later,” according to Erin Chapman, program manager at Galois. The company is working with the Department of Homeland Security Science and Technology Directorate to create a tool that will help partners stop DDoS attacks from spreading. […]

Invalid post type: event_post_type
Cyber Security Brainstorm

Cyber Everywhere: Collaboration, Integration, Automation We’ve seen all of the cyber headlines this year – new policies emerging, old policies evolving, the cyber workforce is multiplying, and rapidly growing connected devices are complicating governance. While the Federal government is focused on security, new adversaries and attack vectors still emerge hourly. What are the early grades […]

Categories