FedCyber’s latest update to Fed Approaches to Cyber Security is now available to our FedCyber Community here. This paper examines changes in the cyber threat/response landscape over the last year and recommends adjustments to current approaches based on shifting mission needs. ...
Posts Tagged: US Federal Reserve
Anonymous (Photo credit: Schuilr) 3 Million Iranian Bank Accounts Disclosed Iranian ATM’s are dispensing PIN and Password changes instead of money this week following the public disclosure of three million bank account details by an Iranian security researcher. While the disclosure of these acco...
This month, the Department of Energy, in working with the White House, Department of Homeland Security, and power companies, will test a voluntary reporting model to discover cybersecurity gaps in electricity delivery systems. More here. A researcher at the Department of Energy’s Pacific North...
Although nearly a year has passed since President Obama signed a federal law mandating that agency officials put policies and infrastructure in place to support teleworking, many federal employees whose managers trust them to telework still aren’t doing so, according to a new survey. The Oba...
No sooner than a few weeks after the Department of Veterans Affairs opened up its networks to iPads, the agency reports the first stolen iPad. Not that VA CIO Roger Baker wasn’t expecting this to happen. According to a report first released as part of a monthly cybersecurity report posted on t...
via InformationWeek Government Having jump-started Uncle Sam’s move into cloud computing, Vivek Kundra is now aiming more broadly, pitching the idea of a “global cloud-first policy” and agreeing to advise the European Union on its cloud strategy. They’re impressive next steps...
via eCommerce Times Retooling federal IT management won’t come easily or quickly, but agencies increasingly are including management capability criteria in their “requests for information” to vendors. With this aspect of contracting gaining more attention, vendors that can enhance ...
via InfoSecurity Magazine According to Ed Gibson – EdTheFed on LinkedIn – data that is posted on the internet should be regarded as permanent after 20 minutes, even if the originator has deleted the file. Gibson, former head of cybersecurity with Microsoft and director of security with P...