The Department of Homeland Security has expanded its Continuous Diagnostics and Mitigation Tools Blanket Purchase Agreement with the inclusion of Imperva’s Web application and database firewalls. […]

According to MeriTalk’s report titled “Navigating the Cybersecurity Equation,” government agencies are struggling to derive cybersecurity intelligence from big data. Federal agencies stated that the greatest challenge in data analytics is the overwhelming amount of data agencies have to sift through. […]

Like Federal entities and tech companies nationwide, the National Geospatial-Intelligence Agency is working on solutions for good cybersecurity practices. Matt Conner, deputy information security officer and director of the Cybersecurity Office at NGA, said that the agency is in the laborious process of moving to the cloud. Conner will be speaking on cyber risks at the Symantec Government Symposium on Aug. 30. […]

In the five years since the government has encouraged agencies to transition to the cloud, spending on cloud-based technologies has increased to about 9 percent, which is a good pace, according to Tom Ruff, vice president of Public Sector America at Akamai. […]

In a letter sent to Federal Communications Commission Chairman Tom Wheeler, Rep. Ted Lieu, D-Calif., requested that the agency expedite its investigation of the Signaling System Number 7 flaw in light of a recent Democratic Congressional Campaign Committee hack. […]

The Department of Veterans Affairs announced that the Department of Homeland Security and Hiring our Heroes have teamed up to offer free online, on-demand cybersecurity training to government employees and veterans via DHS’ Federal Virtual Training Environment. […]

SecureAuth has launched SecureAuth University, a continuing education program for cybersecurity professionals. Through e-learning and instructor-led courses, SecureAuth University offers certification for three levels of cybersecurity professionals: administrator, advanced administrator, and developer. […]

Partnerships between private companies and government agencies sometimes require more patience than young startups have, according to Rocky DeStefano, cybersecurity subject matter expert for Cloudera. DeStefano will participate in a panel discussion at MeriTalk’s Cyber Security Brainstorm on Sept. 13. […]

The National Institute of Standards and Technology aims to improve communication with non-Federal systems containing Federal data through updates to its guidelines “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” also referred to as 800-171. […]

A cybersecurity professional in Arlington, Va., who protects the Pentagon, makes 72% less than someone doing similar work in Minneapolis. A study from Indeed compared salaries from information security specialists in 15 cities. […]

Government employees who attended the hacking conventions of the past had a pretty hard time remaining unnoticed, as many hosted “Spot the Fed” games that rewarded attendees for outing Federal employees. Today’s hacking conventions, like Black Hat and Defcon that took place earlier this month, are creating a much more collaborative environment. […]

They’re not exactly “Wolverine” and “Rogue” of the X-Men fictional superhero franchise, but IBM is betting on its new X-Force Red unit of world-class cybersecurity experts to help the company continue the expansion of its security consulting and services business. The company announced that X-Force Red will consist of hundreds of security experts based in dozens of locations around the world. […]

The Federal government should focus more on defensive cybersecurity measures, work around the regulatory culture of government, and hire more in-house cybersecurity professionals, according to Alex Levinson, information security specialist at Uber. […]

A recently discovered hack on NASA data that exposed username and password information of the agency’s employees is actually a copy of information that was exposed in 2013, according to NASA. […]

While colleges and universities would love a silver bullet, there is no single technology that can protect them from all data breaches. Instead, data security must use a layered approach, with each technology playing an important role. […]

Categories