Worried about Heartbleed? Here’s some common-sense advice – stat!

In an effort to bring some order to the emergency room triage process to treat Heartbleed, FedScoop presents a collection of the best, common-sense advice for those worried about losing the lifeblood of their enterprise to a bleeding heart.

A new milestone for women in the Navy

The Navy yesterday named Vice Adm. Jan E. Tighe commander of U.S. Fleet Cyber Command and U.S. 10th Fleet, making her the first woman in U.S. naval history to take command of a numbered fleet.

EXCLUSIVE: Despite revelations of NSA hacking, Huawei seeks to ‘normalize’ relations with US

Just three months before it learned the National Security Agency had hacked into its networks, China’s largest telecommunications equipment maker, Huawei Technologies Co., met with senior U.S. government officials in an effort to demonstrate its commitment to security, FedScoop has learned.

Is your biggest cyber-threat one cubicle away?

Federal IT professionals say their agencies cyber-resilient, but in reality many grapple with threats and internal ignorance, according to a new study.

Threat Matrix: Episode 15 – Zuckerberg’s surveillance reality check

President Barack Obama today is scheduled to meet with the CEOs of several major Internet companies to discuss civil liberties and privacy, and the government’s commitment to reforming bulk surveillance practices. But the Threat Matrix’s Dan Verton thinks some of the CEOs attending today’s White House meeting may leave disappointed with the president’s timeline for change and the cost.

Panetta: Investment needed to prepare for ‘battlefield of the future’

The government must continue to invest in cutting-edge cybersecurity capability that can defend the nation in what will be the “battlefield of the future,” former Secretary of Defense Leon Panetta said.

Cybersecurity 2014: Beyond the NIST framework

FedScoop asked four leading thinkers in national cybersecurity to share what they would do or change to improve the state of national cybersecurity — beyond the framework.

New jobs report is good news for cybersecurity professionals

The number of job postings for cybersecurity positions grew twice as fast as the overall IT job market in 2013, according to a new study.

Threat Matrix: Episode 13 – Who’s ultimately responsible for national cybersecurity?

This week, Threat Matrix wants to know who is ultimately accountable for the nation’s critical infrastructure cybersecurity. Is it the federal government or the private companies that own and operate the majority of that infrastructure?

Administration defends voluntary nature of cybersecurity framework

Senior officials from the White House and Department of Homeland Security Thursday defended the administration’s hands-off approach to improving critical infrastructure cybersecurity, arguing that mandatory regulations would stifle innovation, hurt the economy and raise difficult questions about privacy and civil liberties.

What Microsoft knows about cybersecurity might surprise you

2001 was a turning point for the company that brought the world Windows and arguably, the most popular office suite of productivity applications in history. Microsoft Corp. was under attack from cyber-criminals and it was losing. In fact, internally there were questions about the company’s ability to survive.

Major companies underreport cyber-risks, study finds

Major technology and telecommunications providers are twice as concerned about cyber-risks from outsourcing vendors and are twice as likely to report those concerns in public financial documents than the vast majority of the Fortune 1000, according to new research.

Threat Matrix: Episode 12 – DOD’s mobile device strategy

The mobile device and app market may be in for some big changes when it comes to security. And those changes could very well come as a result of new requirements being pushed by the Pentagon. Dan Verton caught up with DOD CIO Teri Takai at this year’s MobileGov Summit.

Does the Pentagon hold the keys to improving mobile device security?

Teri Takai may have something no other federal chief information officer or industry executive has: a budget and a strategy that just might deliver on the promise of a more secure mobile device market.

EXCLUSIVE: VA downplays risk assessment report

A 2013 internal security risk assessment of the Department of Veterans Affairs’ main electronic health record system that warned a data breach was “practically unavoidable” did not consider various security mitigation actions the department had already taken to address a very specific vulnerability, according to VA officials.

Feds take realistic look at continuous diagnostics mitigation

Margie Graves, deputy chief information officer at the Homeland Security Department, Peter Gouldmann, director of the State Department’s information risk programs, and Steve Viar, director of FEDSIM at the General Services Administration’s Federal Acquisition Service spoke at yesterday’s AFFIRM luncheon about the current status and future of continuous diagnostics mitigation.

VA risk assessment warned of ‘unavoidable’ security breach

A 2013 internal Department of Veterans Affairs security risk assessment of the department’s main electronic health record system warned a data breach was “practically unavoidable.”

Cybersecurity framework released to public

The White House announced Feb. 18 the completion of its cybersecurity framework, about one year after President Barack Obama signed an executive order mandating the creation of best practices and standards to help improve cybersecurity.

Threat Matrix: Episode 10 – Former DISA Director Lt. Gen. Harry Raduege on cybersecurity framework

This week, Dan Verton talks with retired Air Force Lt. Gen. Harry Raduege about his impressions of the newly released cybersecurity framework.

Administration releases cybersecurity framework

The National Institute of Standards and Technology today released the first version of the long-awaited cybersecurity framework, a voluntary set of guidelines designed to help improve cyber defenses across a wide range of privately owned and operated critical infrastructures.

Page 1 of 321 2 3 4 32