Cybersecurity

DHS centralizes cybersecurity programs

Homeland Security Secretary Janet Napolitano said DHS' many cybersecurity functions have been centralized under Philip Reitinger.

Cybersecurity

Analysis: One Step Behind

As cyberattackers march on, the government still is trying to figure out how to secure the nation's critical networks.

Cybersecurity

Cybersecurity training: The battle over mandates

A debate rages over a Senate proposal to require certification or licensing for all cybersecurity professionals who work on government information systems.

Cybersecurity

How DOD's certification program works

DOD published a manual describing various job categories, including technical and management positions, and the different certifications that meet the training requirement. Here are a few examples.

Cybersecurity

The new cybersecurity licensing proposal

Here's how a Senate proposal to require certification or even licensing for cybersecurity professionals would work.

Cybersecurity

Deepwater watch: Coast Guard Acquisition Directorate gets new leader

The Coast Guard Acquisition Directorate has a new rear admiral in charge — Ronald Rábago.

Cybersecurity

Cybersecurity: Legislation, new security controls on same track

New catalog of information and security controls co-developed by NIST, the Pentagon and the intelligence community, along with information security legislation gaining traction in Congress, are expected to significantly improve federal cybersecurity standards.

Cybersecurity

Feds must get serious about checking commercial software for threats

As agencies migrate from writing their own applications in favor of commercial packages, they increase their exposure to viruses and other malware.

Cybersecurity

DHS funds IT-related projects

Some of the $1.8 billion in DHS grants will go to state and local governments' technology projects.

Cybersecurity

White House working on plan to respond to a national cyberattack

Administration will seek feedback from state and local governments and business groups, and create a wiki that will allow collaboration on developing a framework.

Cybersecurity

DHS spending bill would fund SBInet, E-Verify

The DHS spending bill approved by the House Appropriations Committee would fund several technology programs.

Cybersecurity

DISA seeks identity management technology

DISA wants to learn more about emerging access control technologies that can simplify management and interoperability.

Cybersecurity

Hathaway: National cyber incident response plan coming by year end

The team that conducted the 60-day review of government cybersecurity policy is following up with a national incident response plan and efforts to untangle legal hindrances to improved security.

Cybersecurity

Reform bill is just the start of improving information security

Standards to guide agencies on how to follow security processes and vendors on what requirements to include in products also are needed.

Cybersecurity

Navy wants proposals on cyber research

The Office of Naval Research said today it plans to award more than $14.5 million for research on software engineering, networks, social networks and critical infrastructures.

Cybersecurity

Official: Gates still considering cyber command

A new Defense Department cyber command would not lead to a military takeover of cyberspace, says Deputy Defense Secretary William Lynn.

Cybersecurity

Sensitive information protection remains tough

The government is exploring policy and technology solutions to improve the way it shares sensitive but unclassified terrorism-related information with state, local and industry officials.

Cybersecurity

Homeland Security keeps cybersecurity role

The Homeland Security Department's proposed budget for fiscal 2010 and recent public statements show the Obama administration's new cybersecurity strategy isn't cutting out DHS.

Cybersecurity

Wisen up to handheld security

As the use of handheld devices in government has vastly expanded during the past eight years, so have the security risks. Agencies need to know the risks and take steps to protect sensitive data and communications.