How do you approach managing the cybersecurity of an event as massive and popular as the Olympics? According to Symantec’s vice president for the Americas, Rob Potter, treat the event like a Fortune 100 company. […]
The Federal government should focus more on defensive cybersecurity measures, work around the regulatory culture of government, and hire more in-house cybersecurity professionals, according to Alex Levinson, information security specialist at Uber.[…]
Hillary Clinton’s cybersecurity fundraiser, happening in Las Vegas during Black Hat, isn’t being endorsed by the information security convention.[…]
The White House on Tuesday took a step forward in coordinating Federal response to cyber incidents in the U.S. with the announcement of a Presidential Policy Directive on United States Cyber Incident Coordination.[…]
Members of the public can now use Department of Homeland Security data in order to develop solutions to cyber threats. The Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) is an online library offering infrastructure and event data.[…]
The active critical vulnerabilities at the Department of Homeland Security have decreased by 99 percent and the time that it takes to detect problems has been cut in half in government agencies since October. The Cybersecurity Strategy and Implementation Plan and Cybersecurity National Action Plan focused on bringing the whole government up to speed on cybersecurity initiatives; however, some individual agencies developed their own way of protecting their digital information.[…]
In 2008, the Department of Defense Cyber Crime Center invited 16 companies to discuss information sharing and collaboration. Today, the DC3 partners with 400 companies to share information. Maintaining relationships with partner companies was an important subject at the Federal Forum 2016’s panel on Information Sharing and Next-Gen Defense.[…]
The Department of Homeland Security on Monday announced a program called Exemplar, in which DHS employees with backgrounds in science, technology, engineering, and mathematics will work for a six-month period at a for-profit, private sector company. On Tuesday, DHS received its first application from one such company.[…]
U. S. Customs and Border Protection is trying to forge new ties with technical-minded people working at startups. Earlier this month, CBP released two solicitations for the startup world, including one for K-9 wearable technology and another calling for enhancements for Global Travel Assessment Systems.[…]
The Department of Homeland Security will be accepting proposals created in video format in addition to proposals created with the traditional method of written text. According to Russell Deyo, undersecretary for management at DHS, this new inclusion is an aspect of the department’s procurement innovation initiative.[…]
In the era of the Internet of Things, Federal agencies need to change the way they think of cybersecurity, according to Microsoft Federal CTO Susie Adams.[…]
The National Science and Technology Council calls for more modern science and technology capabilities in national security in its report, titled “A 21st Century Science, Technology and Innovation Strategy for America’s National Security.”[…]
The sun could pose the largest digital security risk to U.S. critical infrastructure, according to witnesses at a House Oversight and Management Efficiency Subcommittee. “All critical infrastructure sectors are at risk from EMP [electromagnetic pulse],” said Brandon Wales at DHS.[…]
Secretary of Defense Ash Carter announced a significant expansion of the Pentagon’s Silicon Valley-based experimental technology unit, including dedicated funding pipelines, a new partnership leadership structure, and plans to stand up a second unit in Boston.
The Federal Emergency Management Agency’s IT programs lack support the agency needs in order to respond to major disasters, GAO finds.
Kryptowire, a company that assesses the security of Android and iOS mobile applications, will be available to Federal agencies as a resource for vetting their mobile applications.[…]