Peter Romness, the Cybersecurity Solutions Lead for Cisco U.S. Public Sector, spoke with MeriTalk at this year’s Cyber Security Brainstorm in Washington, D.C., about the security challenges posed by what Cisco refers to as the Digitization of Everything (DoE). Taped on Sept. 23 Peter Romness: The MeriTalk Interview View on YouTube
Have you ever wondered why it’s really taking the government so long to move more than basic email services to the cloud? Well, if you have then you are certainly familiar with the standard cultural and security explanations: Federal IT managers like to be able to see and touch the blinking lights on their servers […]
Paul Christman, vice president of Dell Software Federal, spoke with MeriTalk at this year’s Cyber Security Brainstorm in Washington, D.C., about the difficulty of establishing baseline security controls and why automation is key to cybersecurity efforts in government agencies of all sizes. Paul Christman: The MeriTalk Interview View on YouTube
Cloud computing’s benefits outweigh the risks associated with moving data and applications to the cloud, panelists said at the Cloud Computing Caucus Advisory Group meeting this week. Cultural hurdles and practical concerns about making the transition from legacy systems to cloud computing continue to prevent more rapid adoption of cloud computing initiatives, and Federal agencies […]
Despite the growing threat and success of cyberattacks on government and commercial sites, the information community around the world is failing to recruit talented women with the expertise to create a tougher information security wall, a new report says. The 2015 global report, “Women in Security: Wisely Positioned for the Future of InfoSec,” by (ISC)² […]
The world is a big place and we can learn a lot by studying how different governments and business cultures approach the pressing technology challenges of the day. David Bray recently had a chance to do just that. As a 2015 Eisenhow Fellow, Bray spent 5 weeks visiting with senior government and industry leaders in […]
Insiders remain a significant threat to Federal agencies. A recent report, “Inside Job: The Federal Insider Threat Report,” illustrates the ongoing danger Federal agencies face from insider threats and the work agencies need to do to protect data. In the past year, 45 percent of Federal IT managers say their agency has been a target […]
The Father of the Internet sees the potential of the Internet of Things. But there are also risks associated with having billions of connected devices, Vint Cerf said at the Fourth Annual Cyber Security Brainstorm. “The headline I worry about is ‘100,000 Refrigerators Attack Bank of America,’” said Cerf, who helped develop the TCP/IP protocols […]
Preventing cyber attacks requires focusing on adversaries rather than the technology used to stop those adversaries, the retired deputy director of the National Security Agency (NSA) said Wednesday at MeriTalk’s Fourth Annual Cyber Security Brainstorm. “It’s about more than technology,” said Chris Inglis, who retired from the NSA last year and now teaches at the […]
MeriTalk hosted its fourth annual Cyber Security Brainstorm Wednesday and packed the conference center at the Newseum in Washington, D.C., with government and industry cyber security experts who braved gridlock-inducing security restrictions put in place during the Pope’s visit so that they could share the latest best practices in cyber intelligence, combating the insider threat […]
As many as 50,000 Department of Veterans Affairs employees took part in an unauthorized internal social network that may have compromised VA data as far back as 2008, according to the results of an investigation released today. In a heavily-redacted 21-page report, released Thursday in response to a Freedom of Information Action request by MeriTalk, […]
Data breaches at the Office of Personnel Management (OPM) have prompted a major cybersecurity push in Congress, and two bills propose giving the Department of Homeland Security (DHS) new authority and tools to protect Federal systems.
Decades of funding shortfalls and tired legacy systems are to blame for the massive data breach at the Office of Personnel Management (OPM), says OPM Director Katherine Archuleta, who defended her agency and its staff under heavy questioning in Congress last week. Case in point: OPM was using the most basic version of Einstein, the […]
So the Office of Personnel Management (OPM) admits it’s suffered what just might be the worst data breach in history, with some 4 million Federal employees’ personal data exposed, and China is once again to blame.
Now that Congress has finally approved the USA Freedom Act, the next big cyber debate is shaping up around the Cybersecurity Information Security Act (CISA).
From newly approved cybersecurity measures to privacy rights and credit cards, Congress was busy last week making moves and tinkering with budgets.
Looking to figure out how your organization can best utilize the NIST Cybersecurity Framework to manage risk and improve security?
Key Federal leaders share their thoughts on FITARA, cybersecurity, and more.
Perennially defending itself against cyberattacks, the Pentagon will go on the offensive and unleash its cyber-arsenal against hackers.
It’s not a matter of if you’ll get hacked – it’s when.
“E-mailgate” makes us wonder how many government officials regularly work off the government grid.
Here in America, we like to think of ourselves as leaders. Winners. The best at everything we tackle. Now we have another trophy for the mantle. We’re No. 1 in cyber risk.
Just one year ago, President Obama gave us an important new cybersecurity solution.
You probably already know plenty about the latest in consumer high-tech gadgetry from the Consumer Electronics Show in Las Vegas last week. But you might not be as familiar about what happened at the 10th annual CES Government, which preceded the main event.
Congress finally passed the Cyber Security Protection Act this month, amending the Homeland Security Act of 2002 to modernize cybersecurity measures for the 21st century.
The Federal Information Security Modernization Act, passed this month, brings cybersecurity into the 21st century and changes the rules of the road for Federal employees in IT.
Feds need help stopping cyber attacks. Ethical hackers look for weaknesses in networks. Can they work together to improve cyber security?
Despite widespread concern, a question mark remains over the current state of federal cybersecurity.
Regardless of your agency’s mission, Governance, Risk and Compliance (GRC) software puts the consistent systems in place that keep your data secure and your agency in compliance with Federal mandates.
Checked out the latest report by MeriTalk yet? The “Big Five in Overdrive: Are State and Local Networks Ready?”, underwritten by Brocade, examines how the implementation of the Big Five – data center consolidation, mobility, security, big data, and cloud computing – will affect state and local government IT.