The cybersecurity executive order, signed by President Donald Trump, could enable a shift in culture that will help entire agencies gain the cybersecurity knowledge that they need to be successful in their missions, according to agency CIOs. […]

The Unisys 2017 Security Index found that public concern over Internet security has increased more than any other security concern since their 2014 survey. “Our biggest percentage increase was in viruses, malware, and hacking activities,” said Bill Searcy, Unisys vice president of global justice, law enforcement, and border security.






[…]

The personal details of nearly 200 million voters were left exposed online by data firm Deep Root Analytics, which was working on behalf of the Republican National Committee, according to UpGuard, which reported the exposure on June 19 and characterized it as “the largest known exposure of voter information in history.”






[…]

Eighteen technology company CEOs are expected to attend the White House Tech Summit on June 19 to talk about modernizing the government’s tech infrastructure and keeping its computers safe from cyberattacks. The technology leaders could benefit if the government moves to modernize with the help of their hardware, software, and cloud-computing services.






[…]

The Federal government currently lacks the empowered leadership necessary to address U.S. cyber vulnerabilities, according to former Federal experts testifying before the Senate Foreign Relations Committee. “For the entire apparatus, there currently isn’t an empowered, either an individual or an agency, to do what I think is necessary,” said Samantha Ravich, senior adviser for the Foundation for Defense of Democracies and former national security adviser for Vice President Dick Cheney.






[…]

Former CIA Director John Brennan said that the Federal government should create an independent commission to regulate the digital domain. Brennan said that the commission should be made up of former government officials and private sector engineers to ensure that there are representatives of both backgrounds.






[…]

Citizens shouldn’t rely only on the law to protect their data, according to Will Ackerly, co-founder and chief technology officer at Virtru and former cloud security architect at the National Security Agency.






[…]

After a spate of recent attacks, including the WannaCry and Dyn breaches, cybersecurity is a chief concern for companies and government agencies alike. Representatives from the private sector, Federal government, and Congress will convene at Tenable’s GovProtect event on June 21 to address cybersecurity issues.






[…]

Cyber AdAPT, a company that markets a platform that analyzes network traffic in real time for signs of malicious activity, was named the Gartner Cool Vendor for 2017 at the Gartner Security and Risk Management Summit on June 12.






[…]

Citing the WannaCry ransomware attacks, members of the House Energy and Commerce Committee brought up concerns with Health and Human Services officials that a similar attack could cause severe damage to U.S. health systems.






[…]

Congress will be busy with future tech initiatives and members have high hopes for the potential of current programs, according to two congressmen who spoke June 7 at MeriTalk’s Cloud Computing Brainstorm. Congressional IT leaders Reps. Will Hurd, R-Texas, and Gerry Connolly, D-Va., talked about the future of major IT initiatives such as FedRAMP, the Modernizing Government Technology (MGT) Act, FITARA, and executive leadership, offering insight into the shape of IT developments in the coming months.






[…]

Darron Makrokanis, vice president of Federal for Tenable Network Security, said the cybersecurity executive order’s time frames are a “bit aggressive,” but the emphasis on cybersecurity is a step in the right direction. Makrokanis will be speaking at Tenable’s GovProtect discussion on June 21.






[…]

Government officials predict that though getting all Federal agencies to comply with the recent Cybersecurity Executive Order and the Modernizing Government Technology (MGT) bill will be difficult, the outcomes will be very beneficial for government.






[…]

The deadline for Federal contractors to complete insider threat training programs under a Department of Defense rule change arrives on May 31, and Bay Dynamics Federal Systems Engineer Thomas Jones calls the mandate an “excellent first step” in improving protections against insider threats.






[…]

A phishing attack in January 2016 gave hackers illegal access to the Department of Interior network through remote logins on at least eight Gmail accounts, according to a report released May 24 by the Office of the Investigator General at DOI.






[…]

1 51 52 53 54 55 72

Categories