Cybersecurity
OPM Says It Breaks Encryption to Monitor Employees' Browsing Habits
Through a technique called "SSL decryption," the agency sees through secure online transactions between a worker’s computer inside the agency firewall and an external website.
Cybersecurity
Hackers Hand US Troops to ISIS, Read Dow Jones Too Early and Scrawl All Over ‘Adult Mag’
Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.
Cybersecurity
Dark Web 101: What Feds Need to Know About the Underbelly of the Internet
And 8 ways to fight bad guys in the online underground, if you have been affected by a data breach.
Cybersecurity
Making the Case for Cyber Defense Spending in Local Government
IT leaders in one Arizona county are working to demonstrate the ROI on cybersecurity investments.
Cybersecurity
A Fan of Islamic Extremists Defaced Brooklyn 'Adult Mag'
Media // New York, United States
Cybersecurity
North Carolina Government Might Have Exposed Information on Medicaid Patients
Government (U.S.) // Healthcare and Public Health // North Carolina, United States
Digital Government
US Navy Revives Ancient Navigation as Cyber Threats Grow
Satellites and GPS are vulnerable to cyberattack. The tools of yesteryear are not.
Cybersecurity
VA's Hickey resigns, OMB seeks cyber specialist and more
News and notes from around the federal IT community.
Cybersecurity
Hacker Allegedly Handed U.S. Service Member Data to ISIS
Government (U.S.) // Arizona, United States
Digital Government
New VA CIO Issues Cyber Strategy, Wants to Tackle ‘Quick Wins’
LaVerne Council said the agency submitted an enterprise cybersecurity strategy to Congress on Sept. 28, ahead of schedule.
Cybersecurity
Fed employee, service member IDs hacked, given to ISIS
The U.S. is blaming a shadowy foreign hacker for sharing stolen data on more than 1,000 feds and U.S. service members with Islamic State militants.
Cybersecurity
DOD to Create Database of OPM Breach Victims
The Pentagon's Defense Manpower Data Center plans to store the information in a “holding file."
Cybersecurity
OPM: ‘There’s No Way’ to Isolate Background Check Systems from the Internet
"Air-gapped" computers are used by defense organizations, nuclear power plants and other environments that require the tightest security.
Cybersecurity
White House Seeks Cyber Policy Guru
Duties include creating policy recommendations and reviewing governmentwide cybersecurity workforce policies, procedures and programs to close any existing gaps,
Cybersecurity
How FITARA helps federal CIOs straddle IT and finance roles
Being an effective CIO means mastering multiple disciplines. Four CIOs new to their posts explain the demands of the role, and how new rules strengthen the CIO's hand in federal organizations.
Cybersecurity
OPM security chief: You're gonna need a bigger boat
There's a playbook for what to do when a big data breach hits, says an OPM official who learned it all the hard way.
Cybersecurity
5 books for your reading list
There are important lessons for federal IT managers in recent fiction and nonfiction books alike.
Cybersecurity
FBI: Your New Chip Cards Aren’t a Cure-All for Fraud
The agency warns consumers who use them: Stay vigilant.
Cybersecurity