cybersecurity


The federal office charged with promoting the sharing of security credentials for government cloud computing systems, known as FedRAMP, has released the first list of accredited Third Party Assessment Organizations (3PAO) approved for testing security controls.

The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. Keep reading →

The House Oversight and Government Reform Committee held a field hearing on technology and the federal government Friday in Northern Virginia, where they heard testimony from large and small information technology companies and government officials about the top technology issues affecting government today.

The hearing was meant to provide access to extensive private-sector IT expertise within Northern Virginia and the National Capital region. It was also an opportunity for federal officials and state and local government partners to share best technology practices amid top technology challenges, including cybersecurity, cloud conversion and data center consolidation, and look at innovative ways to promote efficiency in government IT operations. Keep reading →

On February 17, The Wall Street Journal reported that a researcher working for them discovered that Google ran hidden code designed to circumvent the security settings on Apple devices that use the Safari web browser. While much of the coverage of this revelation has focused on consumers and whether the action may have violated laws or the consent agreement between the FTC and Google, little has been written about the impact for public sector customers.

Public sector customers are big users of Apple devices and these users are governed by a strict set of unique regulations and laws. Given the circumstances of the events here, the question needs to be asked: Did Google break any of the laws or regulations that restrict entities from accessing or changing government computing systems? Keep reading →

Barbara Fast was among those on a CGI mobile securty panel at the Ronald Reagan Building in Washington, D.C. on February 16, 2012.

COMMENTARY: Cybersecurity in the mobile age is everyone’s responsibility, requiring strong partnership among businesses, governments and citizens. We are living in an information age that has changed the way we conduct business and share information. Keep reading →

The Ministry of Defence Main Building in London.

Information became public last week about another successful cyber attack. While that has become the norm, what makes this different is that this successful attack hit the UK Ministry of Defence’s Top Secret System. Keep reading →

Federal CIO Steven VanRoekel speaks with InformationWeek Government Editor John Foley at Thursday’s event.

Having launched a formal strategy on the concept yesterday, federal CIO Steven VanRoekel offered examples Thursday morning of how shared IT services will free up valuable resources across government agencies. Keep reading →

Verizon is teaming up with a Vienna, Va., provider of government-grade encrypted voice-calling software to deliver secure mobile calling capabilities to the U.S. government.

In what Verizon described as a collaborative strategic agreement with Cellcrypt, the two companies expect to release a jointly marketed mobile voice-encryption solution this fall designed to meet the needs of military, intelligence and civilian agencies. Keep reading →


As chief technology officer at the Department of Veterans Affairs, Peter Levin is responsible for the cybersecurity of the largest medical system in the United States and the second largest federal agency.

His job involves helping to facilitate and secure the flow of personal health information among the VA employees at hundreds of hospitals, clinics and offices nationwide, and making that information available electronically to the 21.9 million veterans and their families who depend on the VA for their medical care. Medical professionals and veterans are increasingly seeking to access that information via mobile devices, which raises new concerns about privacy. Keep reading →

An annual study of internet security vulnerabilities released today concluded that “2011 was the first year that mobile malware presented a tangible threat to businesses and consumers.”

The findings, released by Symantec Corp., showed that mobile vulnerabilities nearly doubled, increading by 93% in 2011, with a particular rise in threats targeting the Android operating system. Keep reading →

Our organization, (ISC)² recently participated in the IT Acquisition Advisory Council’s 40th IT-AAC Leadership Roundtable, where high-level cloud stakeholders came together to discuss cloud security, FedRAMP and beyond.

Although I was unable to engage live in the roundtable discussion, I do have some thoughts for government officials to consider as they address the many complexities of securing an initiative that holds more promise for the federal government than any other IT innovation in decades — the cloud. Keep reading →

Page 11 of 291...789101112131415...29