Modernization
Why privilege can be risky
Privileged users, according to a new three-year study sponsored by Forcepoint and performed by the Ponemon Institute, are still a weak point for network security in federal networks.
Cybersecurity
IG: Interior needs to tighten computer security
A new report says the Interior Department needs to strengthen user access controls and mobile encryption.
Cybersecurity
How social media can help spot insider threats
A recent directive on using individuals’ social media activity in the security clearance process is a good first step, but it could go even further.
Cybersecurity
Security clearances dip in 2015
ODNI credits implementation of data initiatives for a reduction in clearances.
Cybersecurity
State plans departmentwide phishing trip
The State Department has selected a vendor to provide a "phishing as a service" solution to improve employee cyber hygiene worldwide.
Cybersecurity
Navy retools cyber policy
The new policy signed by Navy Secretary Ray Mabus sets up a program for preventing insider threats, among other actions.
Cybersecurity
FDIC shakeup over 'major incident' revelations
The agency is scrambling to shore up its internal cybersecurity practices as watchdogs scrutinize a spate of unauthorized employee data extractions.
Cybersecurity
Can investigators reverse engineer insider threats?
The idea is to use past insider threat incidents to stitch together profiles of future rogue employees.
Cybersecurity
Is NBIB another 'house of cards'?
Lawmakers voiced their frustration over the creation and funding of the National Background Investigations Bureau.
Cybersecurity
Why senators need a CISO
Users might be daredevils or they might not fully understand their cybersecurity risks, said the man in charge of protecting U.S. senators' networks. Either way, CISOs have to work with what they've got.
Cybersecurity
Intel officials dwell on encryption as a potential security problem
FBI Director James Comey and other senior intelligence leaders told Congress that the use of encrypted communications by terrorists and other adversaries remains a problem for investigators.
Cybersecurity
A breach is coming -- is your agency ready?
The key to successfully navigating a security breach is to develop a three-pronged, comprehensive incident response process ahead of time.
Cybersecurity
Privacy groups discuss encryption with White House
Obama administration officials met with multiple civil liberties groups about a petition urging the president to support strong encryption.
Cybersecurity
Governance lags tech on info sharing, CIA's Brennan says
The CIA director warns that the rapid technological improvements in spycraft and information collection have outpaced the ability of worldwide intel agencies to cooperate.
Cybersecurity
Protecting government IT systems at the source
Most IT organizations understand the importance of protecting data but have a blind spot regarding the security of the IT systems themselves.
Cybersecurity