Nextgov - Cybersecurity Reporthttp://www.nextgov.com/cybersecurity/cybersecurity-report/Updates on the Battle to Protect Data & Systemsen-usWed, 22 Oct 2014 17:43:11 -0400Cyber Policy Still Stuck in the ‘90shttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/10/cyber-policy-still-stuck-90s/97184/In the nearly 20 years since the first cyber policy discussions, technology has changed tremendously. The debate hasn’t caught up yet.Jessica Herrera-Flanigan Wed, 22 Oct 2014 17:43:11 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/10/cyber-policy-still-stuck-90s/97184/Cybersecurity - Cybersecurity ReportMaksim Kabakou/Shutterstock.comDo We Need to ‘Disrupt’ the Cybersecurity Status Quo?http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/09/do-we-need-disrupt-cybersecurity-status-quo/95150/Next month marks 10 years since DHS first marked Cybersecurity Awareness Month. Is the cyber conversation stuck in 2004?Jessica Herrera-Flanigan Thu, 25 Sep 2014 16:41:17 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/09/do-we-need-disrupt-cybersecurity-status-quo/95150/Cybersecurity - Cybersecurity ReportMaksim Kabakou/Shutterstock.comWill Obama's New Tech Squad Include Cyber Experts?http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/08/will-there-be-cyber-experts-obamas-new-dot-gov-brigade/92366/Digital Service team announcement didn’t mention privacy or security, while snoops continue targeting Internet users.Aliya SternsteinMon, 25 Aug 2014 17:27:36 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/08/will-there-be-cyber-experts-obamas-new-dot-gov-brigade/92366/Cybersecurity - Cybersecurity ReportErika Cross/Shutterstock.comHow Cyber Scary Is It Outside Today?http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/07/how-cyber-scary-it-outside-today/88897/Nextgov's new iPhone app measures threat levels for every sector and dissects daily hacks.Aliya SternsteinWed, 16 Jul 2014 17:15:07 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/07/how-cyber-scary-it-outside-today/88897/Cybersecurity - Cybersecurity ReportSenate Defense Bill Unearths NSA ‘Sharkseer’ Programhttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/senate-defense-bill-unearths-nsa-sharkseer-program/85315/Lawmakers want to drop $30 million on an obscure National Security Agency cybersecurity program.Aliya SternsteinWed, 28 May 2014 14:41:13 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/senate-defense-bill-unearths-nsa-sharkseer-program/85315/Cybersecurity - Cybersecurity Reportm00osfoto/Shutterstock.comHHS, DHS and EPA Don’t Need to Dole Out New Cyber Ruleshttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/hhs-dhs-and-epa-dont-need-dole-out-new-cyber-rules/85048/Voluntary measures will suffice, the White House has concluded.Aliya SternsteinThu, 22 May 2014 16:15:37 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/hhs-dhs-and-epa-dont-need-dole-out-new-cyber-rules/85048/Cybersecurity - Cybersecurity ReportWhite House Cybersecurity Coordinator Michael DanielAnn Heisenfelt/APUSPS Employees Get Fake USPS Phishing Emails, Toohttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/usps-employees-get-fake-usps-phishing-emails-too/84880/Here's an inside peak at what happens next.Aliya SternsteinWed, 21 May 2014 17:52:00 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/usps-employees-get-fake-usps-phishing-emails-too/84880/Cybersecurity - Cybersecurity ReportPaul Sakuma/AP file photoLawmakers Say Favored NSA Reform Bill Doesn’t Go Far Enoughhttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/lawmakers-say-favored-nsa-reform-bill-doesnt-go-far-enough/84463/House members want to insert an amendment barring the agency from exploiting zero day flaws.Frank KonkelThu, 15 May 2014 08:16:00 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/lawmakers-say-favored-nsa-reform-bill-doesnt-go-far-enough/84463/Cybersecurity - Cybersecurity ReportPatrick Semansky/AP file photoFCC Employees, Is Your Internet Running Sluggish Today?http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/fcc-employees-your-internet-running-sluggish-today/84427/Some website operators are slowing FCC staff's access to their sites in protest of potential paid Internet fast lane regulations.Aliya SternsteinWed, 14 May 2014 15:47:37 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/fcc-employees-your-internet-running-sluggish-today/84427/Cybersecurity - Cybersecurity ReportMembers of US advocacy groups camp outside FCC headquarters in Washington, DC, on Jan. 30, 2014Kevin Wolf/AP Feds: You Need to Fix Your TSP Passwords This Weekendhttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/feds-you-need-fix-your-tsp-passwords/83965/The federal retirement program website is changing its policy to stop giving identity thieves clues about how to crack employee passwords.Aliya SternsteinWed, 07 May 2014 16:22:21 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/feds-you-need-fix-your-tsp-passwords/83965/Cybersecurity - Cybersecurity ReportBruce Rolff/Shutterstock.comIntel Firm Links Ukraine Energy Debt With Potential Cyber Assaulthttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/intel-firm-links-ukraine-energy-debt-potential-cyber-assault/83707/Recorded Future drilled into a wide range of Web data to create a speculative timeline of potential network attacks.Aliya SternsteinFri, 02 May 2014 17:19:31 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/05/intel-firm-links-ukraine-energy-debt-potential-cyber-assault/83707/Cybersecurity - Cybersecurity ReportRussian President Vladimir PutinMikhail Klimentyev, Presidential Press Service/APCybersecurity May Be Going the Way of Country Musichttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/04/cybersecurity-may-be-going-way-country-music/83335/And many of us are starting to do the equivalent of changing the dial.Jessica Herrera-Flanigan Mon, 28 Apr 2014 16:35:33 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/04/cybersecurity-may-be-going-way-country-music/83335/Cybersecurity - Cybersecurity ReportCountry music artist Toby KeithChris Pizzello/Invision/APOne Chart Shows Why You Shouldn’t Trust the Feds With Your Datahttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/04/one-chart-shows-why-you-shouldnt-trust-feds-your-data/81844/The number of reported information security incidents involving personally identifiable information has more than doubled in recent years.Ross Gianfortune and Katherine McIntire PetersThu, 03 Apr 2014 14:08:39 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/04/one-chart-shows-why-you-shouldnt-trust-feds-your-data/81844/Cybersecurity - Cybersecurity ReportSergey Nivens/Shutterstock.comOp-Ed: Agency IT Budgets Aren’t Keeping Pace with Malware Threathttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/op-ed-agency-it-budgets-arent-keeping-pace-malware-threat/80953/If lawmakers don’t increase IT budgets, agencies will have to sacrifice some of their cybersecurity initiatives.Mohamad Elbarasse, immixGroupThu, 20 Mar 2014 15:37:34 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/op-ed-agency-it-budgets-arent-keeping-pace-malware-threat/80953/Cybersecurity - Cybersecurity ReportPavel Ignatov/Shutterstock.comThe Internet of Things Means More Things to Hackhttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/internet-things-whole-new-world-cyber-vulnerability/80593/It's great that more everyday items have online capabilities, but it's also a whole new world of cyber vulnerability.Jessica Herrera-Flanigan Fri, 14 Mar 2014 16:34:03 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/internet-things-whole-new-world-cyber-vulnerability/80593/Cybersecurity - Cybersecurity ReportHigh-tech, Wi-Fi-connected trash cans are placed around London to monitor commuters. Lefteris Pitarakis/APRussia's Holding Back Cyber Capabilities in Ukrainehttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/russias-holding-back-cyber-capabilities-ukraine/80233/'If Russia really wanted to deal a devastating blow . . . they could have definitely done it.'Aliya SternsteinMon, 10 Mar 2014 17:07:14 -0400http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/russias-holding-back-cyber-capabilities-ukraine/80233/Cybersecurity - Cybersecurity Reportvagant/Shutterstock.comFour Federal Cyber Escapades to Watch For This Springhttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/four-federal-cyber-escapades-follow-spring/79960/Budget request hints at novel approaches cyber threats; details to come at congressional hearings.Aliya SternsteinWed, 05 Mar 2014 16:26:31 -0500http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/four-federal-cyber-escapades-follow-spring/79960/Cybersecurity - Cybersecurity ReportMaksim Kabakou/Shutterstock.comDropbox Addresses Government Spyinghttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/02/helpful-telework-tool-dropbox-addresses-government-spying/79229/New policy lays out the service's 'government request principles.'Aliya SternsteinFri, 21 Feb 2014 17:03:34 -0500http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/02/helpful-telework-tool-dropbox-addresses-government-spying/79229/Cybersecurity - Cybersecurity ReportFlickr user babybenOp-Ed: Three Steps That Would Significantly Improve Cybersecurityhttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/02/op-ed-three-steps-would-significantly-improve-cybersecurity/78857/There’s no need to wait for Congress to act -- there are important things we could do right now.Robert DixFri, 14 Feb 2014 11:02:41 -0500http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/02/op-ed-three-steps-would-significantly-improve-cybersecurity/78857/Cybersecurity - Cybersecurity Report igor.stevanovic/Shutterstock.comDHS Hires Booz to Finish Cyberattack Drill Jobhttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/02/dhs-hires-booz-finish-cyberattack-drill-job/78833/Company awarded contract extension after department fell behind on the Cyber Storm project.Aliya SternsteinThu, 13 Feb 2014 17:11:04 -0500http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/02/dhs-hires-booz-finish-cyberattack-drill-job/78833/Cybersecurity - Cybersecurity ReportUnited States Customs and Border Protection file photoThe FBI Is in the Market for Malwarehttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/02/fbi-market-malware/78218/The specific organization in need is the FBI Investigative Analysis Unit of the Operational Technology Division.Aliya SternsteinTue, 04 Feb 2014 17:41:13 -0500http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/02/fbi-market-malware/78218/Cybersecurity - Cybersecurity ReportPavel Ignatov/Shutterstock.comOp-Ed: It’s Time to Take Action on Cybersecurityhttp://www.nextgov.com/cybersecurity/cybersecurity-report/2014/02/op-ed-its-time-take-action-cybersecurity/78122/Our adversaries aren’t standing idly by while we get our defenses in order.Frank Cilluffo and Sharon CardashTue, 04 Feb 2014 08:00:00 -0500http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/02/op-ed-its-time-take-action-cybersecurity/78122/Cybersecurity - Cybersecurity ReportMaksim Kabakou/Shutterstock.comData Breach Epidemic: Why Are We Blaming the Victims?http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/01/data-breach-epidemic-why-are-we-blaming-victims/77795/The question going forward is what is the proper standard for protecting data, especially without the existence of universal technical, operational, and policy standards?Jessica Herrera-Flanigan Wed, 29 Jan 2014 11:36:01 -0500http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/01/data-breach-epidemic-why-are-we-blaming-victims/77795/Cybersecurity - Cybersecurity ReportTarget experienced a massive data breach in 2013.ValeStock/Shutterstock.comAgencies to Focus on Illegal Cyberweapons Trade in 2014http://www.nextgov.com/cybersecurity/cybersecurity-report/2013/12/agencies-focus-illegal-cyberweapons-trade-2014/75815/Defense bill calls for agencies to work together on guidelines.Aliya SternsteinFri, 20 Dec 2013 10:22:53 -0500http://www.nextgov.com/cybersecurity/cybersecurity-report/2013/12/agencies-focus-illegal-cyberweapons-trade-2014/75815/Cybersecurity - Cybersecurity Report fixer00/Shutterstock.comWhite House's $14 Billion Cyber Spending Claim Is Squishyhttp://www.nextgov.com/cybersecurity/cybersecurity-report/2013/11/white-houses-14-billion-cyber-spending-claim-squishy/73475/The administration's 2014 governmentwide computer security budget has two line items -- cyber IT and cyber non-IT activities -- neither of which has a dollar figure attached.Aliya SternsteinFri, 08 Nov 2013 08:40:46 -0500http://www.nextgov.com/cybersecurity/cybersecurity-report/2013/11/white-houses-14-billion-cyber-spending-claim-squishy/73475/Cybersecurity - Cybersecurity ReportAdam Parent/Shutterstock.com