Cybersecurity has grown in importance as networked systems become irreplaceable methods for delivering federal services and enabling day-to-day operations. The Office of Management and Budget reported in March 2010 that during fiscal 2010 agencies identified 41,776 cyber incidents--a 39 percent increase in cyber attacks over the previous year.

Big changes are afoot in the federal cyber arena, with the Defense Department having stood up Cyber Command, the Homeland Security Department readying active defense measures for federal networks and the entire federal government debating the role it should play in securing critical infrastructure in private sector hands. 



Latest Headlines

Latest Headlines

DHS prepares for hypothetical immigration reform

Secretary Jeh Johnson said in a speech Feb. 7 that "when reform legislation is enacted, DHS must be prepared to implement reform. So to prepare for this potential outcome, I have already directed the deputy secretary of homeland security to coordinate the process, to ensure we are ready to implement the law." The speech, at the Wilson Center in Washington, D.C., was Johnson's first major policy address since his confirmation in December.

eBenefits PII glitch potentially affected about 1,300 says VA

A software defect that caused a joint Veterans Affairs and Defense Department self-service benefits portal to display personally identifiable information to other users accessing the system affected no more than 1,362 individuals, a VA officials told a House panel.

IT management, security challenges are widespread at agencies

Struggles with information technology are the most common management challenges across large agencies, an analysis from the consulting firm Grant Thornton shows. Numerous agencies faced challenges with both IT security and management.

House Homeland Security approves critical infrastructure cybersecurity bill

The House Homeland Security Committee approved by unanimous voice vote a cybersecurity bill that would codify the Homeland Security Department's role in federal cybersecurity and require it to work with the private sector on securing critical infrastructure.

Agency cybersecurity criticized in Senate report

Basic cybersecurity measures such as patching, anti-virus software updates and password management are insufficient at federal agencies, leaving government networks vulnerable to even non-sophisticated cyber intrusions, finds a Feb. 4 report.

Summit offers chance to cooperate on nuclear cybersecurity

Nations should form an international agreement that forbids cyber attacks against civil nuclear facilities during peacetime, the EastWest Institute says in a new report.

Agencies lean on mobile, social to collect info

Under a planned sole-source award, the FBI will buy 12 kits from Cellebrite USA, Inc., to obtain call histories, text messages, pictures, videos, passwords, location data and more – including deleted data – from Apple, Android, Blackberry and Microsoft devices.

Cyber threats likely to revolve around political turmoil, international events

In a report that forecasts cybersecurity trends for 2014, the company says that government cyber operations may increase in North African countries undergoing political turmoil and transitions – including Egypt, Libya and Tunisia – as regimes and their supporters seek to monitor dissidents and neighboring countries.

Cyber attacks can be timed for optimal impact and forecast for defense, finds paper

Using a new model that assesses cyber risks, costs and benefits over time, malicious actors can time attacks for the most damaging opportunities – and cyber defenses can be ramped-up in anticipation of a strike, says a new  paper  published in the Proceedings of the National Academy of Sciences.

Improving digital access in developing countries correlates to higher malware rate

A study by Microsoft based on data from its operating system-bundled anti-malware utility finds that the global prevalence of malware infections typically correlates as an inverse to countries' socioeconomic status, but that the relationship isn't necessarily linear.