MeriTalk - Where America Talks Government
Cyber Security Exchange


Share
Delicious Digg StumbleUpon
View All Entries
Archive
Categories
Popular Tags
Posted: 1/26/2012 - 2 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]
Tags: Security

For the past six months, we have been meeting with Federal cyber security leaders to get a sense for their priorities - and lay the groundwork for Cyber Security Exchange. We learned a lot from these conversations, and the latest My Cup of IT blog outlines the key takeaways. We want your thoughts, too, as we work toward our inaugural bi-monthly meeting on March 21. Take a look and let us know if you agree, disagree, or have anything to add to the Fed cyber security wish list.

For more discussion, head back to the discussion board.

Posted: 1/24/2012 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]
Tags: Security

The National Institute of Standards and Technology wants your input on three interagency reports focusing on continuous monitoring:

NIST Interagency Report 7756: CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Architecture. CAESARS stands for Continuous Asset Evaluation, Situational Awareness and Risk Scoring

NIST Interagency Report 7799: Continuous Monitoring Reference Model Workflow, Subsystem, and Interface Specifications

NIST Interagency Report 7800: Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains

Submit your feedback to fe-comments@nist.gov by Friday, February 17 - and feel free to share your thoughts below.

For more discussion, head back to the discussion board.

Posted: 1/24/2012 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

Los Alamos National Laboratory has announced that its QKarD (Quantum Smart Card) technology provides uncrackable data encryption and can fit inside a standard smart phone.  Potential applications include banking, online transactions, access to secure facilities, border crossings, digital rights management controls, and electronic voting. 

How else might we leverage this technology to improve cyber security?  Read more here and share your thoughts below:  http://www.lanl.gov/news/stories/qkard_quantum_cryptography.html.

For more discussion, head back to the discussion board.