DoD Takes Novel Approach to Network Security with “Hack the Pentagon”
It’s not every day the Department of Defense invites people to hack its networks with no fear of repercussion. But that’s exactly what they’ve done—and good for them.
It’s not every day the Department of Defense invites people to hack its networks with no fear of repercussion. But that’s exactly what they’ve done—and good for them.
Arlette Hart is the chief information security officer (CISO) at the Federal Bureau of Investigation. As CISO of the FBI, she has a unique perspective. On the one hand, she is tasked with securing vast amounts of highly sensitive information. On the other, she has the inside track on the emerging cyber-threats, and some ofRead… Read more »
As a result of the need to do more with less and the need for increased security, we now have better technology. Now, people just need to start using it.
The first FITARA scorecards were released earlier this month by the House Oversight and Government Reform Committee’s Subcommittee on Information Technology, and the results weren’t great.
From forging a unity of effort in homeland security to strategizing today how to field the U.S. Army of tomorrow; to pursuing affordable housing, eliminating fraud, waste, and abuse in healthcare, and securing cyberspace, our most recent issue of The Business of Government magazine delves into a diverse set of topics and public management issuesRead… Read more »
Just a few years ago, the only security metric that mattered was whether your organization had been hacked or not. This all-or-nothing definition of security success is now outdated. There are new, more complex metrics that measure the strength of your security posture.
Last year more than 20 million government employees, contractors and their families were hacked. The Office of Personnel Management is now trying to fix some of their cybersecurity gaps during a six-week cyber sprint led by Federal Chief Information Officer Tony Scott. In this month’s DorobekINSIDER Live, “Cybersecurity: Lessons From the OPM Hack,” Chris DorobekRead… Read more »
Follow me on Twitter (@OliverClarkMe) for on-site coverage including blog recaps, live-tweeting from sessions, pictures and more! Threats to societies and organizations have never been more numerous or intense. From fraud and cybercrime, criminal and terrorist threats to weather related disasters and infrastructure emergencies, communities, corporations and countries must prepare for threats, accelerate responses andRead… Read more »
Conservative estimates predict there will be more than 50 billion devices connected to the internet by 2020. That’s more than one internet enabled device per-person on the planet. “This smart technology is the fastest growing technology in history,” said Peter Romness, Cybersecurity Lead for US Public Sector, Cisco. “But with every additional device comes increased securityRead… Read more »
Throughout the second quarter of 2015, the Center for Internet Security’s Multi-State Information Sharing and Analysis Center (MS-ISAC) noted a significant increase in the number of account compromises impacting state, local, tribal and territorial (SLTT) governments. What can you do to help minimize these account compromises?
Notifications