MeriTalk - Where America Talks Government


Sponsors
Fire Eye Symantec Belkin Trustwave BMC Tenable Vormetric A10 Ping Identity BeyondTrust Dell GDIT Cloudera

News



5 Problems That Plague Federal InfoSec Hiring

GovInfoSecurity | Apr 18, 2015

5 Problems that Plague Federal InfoSec Hiring Solutions Posed to Close the Cybersecurity Talent Gap By Eric Chabrow, April 18, 2015. Credit Eligible...

Inside The National Security Database

Data Breach Today | Apr 18, 2015

Inside the National Security Database Rajshekhar Murthy on How NSD Supplies InfoSec Talent By Varun Haran, April 18, 2015. Credit Eligible Rajshekhar Murthy, Director - National Security Database Listen Now ACQ SubscribeSign inSubscribe The...

Debating The Iranian Cyber Threat

FCW | Apr 17, 2015

(Image: Aleksandar Mijatovic / Shutterstock) Iran has used a sophisticated IT infrastructure to launch a growing number of cyberattacks and is "becoming a serious force in the malware world," according to a new study. Attacks from Iranian IP...

Best Practices Should Be Top Priority For Managing Cyber Security Risk, DHS Official Says

Defense Daily | Apr 17, 2015

Companies, government agencies and other organizations should concentrate the vast bulk of their cyber security efforts on implementing best practices with the least effort going to incident response to buy down risk, a Department of Homeland...

These 3 Steps Could Prevent 85 Percent Of All Data Breaches

Next Gov | Apr 17, 2015

Last year, data breaches of both private sector companies and the federal government dominated headlines. In short, a lot of organizations got owned. Andif early 2015 is any indication, there's much more to come. Yet, a great many of these...

New Bill Would Protect Security Research Hacking

The Hill – Hillicon Valley | Apr 17, 2015

Sen. Ron Wyden (D-Ore.) and Rep. Jared Polis (D-Colo.) introduced a bill Thursday that would exempt responsible hacking from prosecution under existing copyright law. The security and academic community has long worried they could face legal...

Why Is The Army Handing Its Cyber Stars To Fox Entertainment?

Next Gov | Apr 17, 2015

At a time when the Pentagon arguably is losing a battle with industry for top techtalent, the Army is offering companies the resumes of its best cyberwarriors. It's just one strategy U.S. organizations are trying out to deal with a workforce...

Cybersecurity Firms Hire Former Military, Intelligence Cyber Experts

Homeland Security News Wire | Apr 17, 2015

CybersecurityCybersecurity firms hire former military, intelligence cyber experts Published 17 April 2015Share| Over the past two years, U.S. cybersecurity firms have brought in several former military and intelligence community computer experts...

Thwarting The Next Generation Of Cyberattacks

Homeland Security News Wire | Apr 17, 2015

CybersecurityThwarting the next generation of cyberattacks Published 17 April 2015Share| The next generation of cyberattacks will be more sophisticated, more difficult to detect, and more capable of wreaking untold damage on the nation's computer...

Homeland Chief: Gyrocopter Came In 'under The Radar'

Federal News Radio | Apr 17, 2015

By ERICA WERNER and EILEEN SULLIVAN Associated Press WASHINGTON (AP) -- The Florida postal carrier charged Thursday with two federal crimes for steering his small gyrocopter through protected Washington airspace "literally flew under the radar" to...

Hackathon Generates Section 508 Resources, Playbook For Agencies To Use

Federal News Radio | Apr 17, 2015

The Office of Science and Technology Policy and the General Services Administration's 18F innovation team joined other technology-focused groups in a March 31 hackathon focused on accessiblity, according to a White House blog post. Along with the...

Your TSP: Is There Action After Retirement?

Federal News Radio | Apr 17, 2015

The federal Thrift Savings Plan was setup as a 401k style investment option for federal and postal workers, and members of the uniformed services. Many experts consider it the best of the best because of its lowest-in-the-business...

Naval Academy Takes Trophy At CDX 2015

Federal News Radio | Apr 17, 2015

The U.S. Naval Academy is the winner of the 15th Annual Cyber Defense Exercise (CDX). Teams from the service academies built cyber-networks and spent four days in fierce competition defending those networks from attacks by the National Security...

Cyber-Attack Risk Mitigation: Key Steps

Data Breach Today | Apr 17, 2015

Cyber-Attack Risk Mitigation: Key Steps How to Avoid Becoming the Next Hacker Victim By Marianne Kolbasuk McGee, April 17, 2015. Credit Eligible Mac McMillan ACQ SubscribeSign inSubscribe Healthcare organizations need to take several key steps to...

Feds' Big Presence At RSA Conference 2015

Data Breach Today | Apr 17, 2015

Feds' Big Presence at RSA Conference 2015 Secretary Jeh Johnson Leads Contingent from Homeland Security By Eric Chabrow, April 17, 2015. Follow Eric @GovInfoSecurity Homeland Security Secretary Jeh Johnson will address the RSA conference. Call the...

PCI DSS Version 3.1 - What's New?

GovInfoSecurity | Apr 17, 2015

PCI DSS Version 3.1 - What's New? Troy Leach of PCI Council Explains New Version of Standard By Tom Field, April 17, 2015. Credit Eligible...

Shortage Of IT Security Professionals Not Unique To Government

Next Gov | Apr 16, 2015

The federal government is not the only entity struggling to fill its ranks with talented information security professionals. The entireworld appears to be in the same boat, according to a new study. Conducted by growth consulting company Frost &...

Improving Accessibility Of Government Websites

The White House | Apr 16, 2015

Subscribe Improving Accessibility of Government Websites Posted by Corinna Zarek and Jeannine Hunter on April 16, 2015 at 03:12 PM EDT As government digital efforts continue to grow, improving accessibility of government websites for individuals...

Agiliance Chief Security Strategist To Present Session On Four Building Blocks For Cyber Security At RSA Conference 2015

Government Security News Magazine | Apr 16, 2015

Sunnyvale, CA, April 16 - Agiliance, Inc., the Big Data Risk Company and independent provider of integrated solutions for operational and security risk intelligence, has announced that Vice President and Chief Security Strategist Torsten George...

NIST Official: Internet Of Things Is Indefensible

FCW | Apr 16, 2015

According to NIST fellow Ron Ross, the interconnectivity of the Internet of Things makes cyber threats inevitable.  (Image: Ron Ross / LinkedIn) The interconnectivity of the Internet of Things (IOT) leaves public and private computer systems...

NIST Considers Update To E-authentication Guideline

Fierce GovernmentIT | Apr 16, 2015

The National Institute of Standards and Technology is looking into updating its 2012 Electronic Authentication Guideline (pdf), and the agency wants the public's help. NIST is seeking comments from experts in industry, government and education on...