Military IT leadership has been increasingly talking about equipping soldiers with smartphones, and now the Army’s 5th Signal Command, via a procurement run by the Defense Information Systems Agency (DISA), is looking at the possibility of buying thousands of mobile devices in a move that coul [...]
FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.
FedCyber 2014 Overview
Video Overview of the 2013 Event
2015 FedCyber Date Announced - Registration Open
This year's event will be held on November 10, 2014 in Tyson's Corner.
The FedCyber Wire
A hacker broke into the mayor of St. Louis’s website and posted a message in support of anti-Wall Street protesters who are facing eviction from a city park they occupied five weeks ago. “You can remove the movement from the city, but you cannot remove the movement from your systems!R [...]
The botnet takedown announced Wednesday by the U.S. Department of Justice was the biggest in history, according to a security company that worked with authorities to identify the alleged criminals. Dubbed “DNS Changer,” the collection of compromised computers numbered over four million m [...]
A powerful Republican senator with a medical degree is warning that the nation’s transition to electronic patient records will lure cyber intruders and should be reconsidered. The federal government is spending nearly $20 billion in economic stimulus funds to move doctors from paper to digital [...]
Military plans new vehicle routers and networking capabilities to help soldiers communicate more securely and effectively in combat situations.
The U.S. military is bolstering its use of technology on the battlefield with new devices and capabilities aimed at improving how soldiers communicate. New rugged routers for military vehicles and satellite- and radio-based networking technologies the Department of Defense plans to deploy will give [...]
Within a year the Health and Human Services Department should stand up a federal agency–the Health IT Safety Council, which should be funded by HHS–to launch an in-depth investigation into the risks associated with health information technology use, according to recommendations from the [...]
An interagency cyber security group has drafted and published a document aimed at defining common terms, requirements and skill sets for those charged with guarding against cyber attack. The National Initiative on Cybersecurity Education (NICE) published a¬†draft document¬†that classifies typical du [...]
President Obama is set to sign Nov. 9 an executive order that will, among other things, restrict the number of information technology devices agencies can issue to federal employees, according to a White House¬†announcement. The executive order will effect cell phones, smartphones, tablets and lapto [...]
Over the next five years, the Defense Advanced Research Projects Agency is set to increase its budget for cyber security research by 50 percent, said the agency‚Äôs director. In a Nov. 7 speech at a DARPA cyber security colloquium, agency Director Regina Dugan said the advent of the Internet 40 year [...]
Smart Grid implementation requires a common semantical understanding of data elements, says the National Institute of Standards and Technology in a draft version 2.0 of its framework and roadmap for Smart Grid interoperability standards. NIST posted the document, dated Oct. 17, online on Oct. 25. It [...]
Homeland Security Department officials warned Nov. 3 of serious consequences to research and procurement operations from House-approved cuts to the budget. “The challenge we face is in fiscal 2011, our budget was cut 19 percent during the [continuing resolution. In fiscal 2012, the House-appro [...]
The¬†security¬†of¬†cloud computing¬†is often debated but such debates seem to be over for the general tasked with running the United States military’s cyber command, who sees the technology not only as way to rein in IT costs but a way to more easily protect IT assets. Speaking here before 700 [...]
The string of cyber attacks that were launched against¬†corporate¬†and government entities this year has placed a spotlight on the need for¬†strengthened cyber defense in the U.S., and an ex-U.S. general is pushing for openness on the topic of cyber weapons and when they will be used. James Cartwrig [...]
The Pentagon’s advanced research arm, which played a key role in developing the Internet 40 years ago, said on Monday it will boost efforts to build offensive cyber arms for possible keyboard-launched attacks against enemy targets. The U.S. military needs “more and better options” [...]
In an anonymous industrial park, CIA analysts who jokingly call themselves the “ninja librarians” are mining the mass of information people publish about themselves overseas, tracking everything from common public opinion to revolutions. The group’s effort gives the White House a d [...]