Security Matters

Civilian vs. military approach to identity & access management

Civilian vs. military approach to identity & access management

Brig. Gen. Gregory Touhill (USAF Ret.), former federal chief information security officer and president at Cyxtera Federal Group, discusses problems...
“Hack Your State Dept” bill to run agency bug bounties

“Hack Your State Dept” bill to run agency bug bounties

Ari Schwartz, managing director of cybersecurity services at Venable, discusses a bill in Congress that would make the State Department...
Challenges in government cyber risk mitigation

Challenges in government cyber risk mitigation

George DeLisle, federal sales director at Varonis, discusses the White House’s planned action on cybersecurity, and how industry is interested...
CLOUD Act passes in omnibus spending bill

CLOUD Act passes in omnibus spending bill

FCW Staff Writer Derek Johnson and Joseph Marks, Cybersecurity Correspondent at Nextgov, discuss the latest cybersecurity stories out of Congress,...
GAO: Border security progress & challenges

GAO: Border security progress & challenges

Rebecca Gambler, Director of Homeland Security and Justice Issues at the Government Accountability Office discusses her testimony on the Department...
DHS announces new research and technology guides

DHS announces new research and technology guides

Douglas Maughan, director of the Cyber Security Division at the DHS Science and Technology Directorate, discusses guides that his agency...
Top priorities for new NSA & Cyber Command leadership

Top priorities for new NSA & Cyber Command leadership

Retired Rear Admiral Bill Leigher, director of DoD Cyber Programs at Raytheon, talks with Colby Hochmuth about the upcoming change...
DHS warns Russian cyberattacks are increasing

DHS warns Russian cyberattacks are increasing

Ron Marks, chair of the Intelligence Program at the Daniel Morgan Graduate School of National Security, sits down with Francis...
Common themes in agency cyber risk mitigation

Common themes in agency cyber risk mitigation

Jeanette Manfra, Assistant Secretary of the Office of Cybersecurity & Communications at the Department of Homeland Security, discusses how agencies...
Cyberactivity consequences for the Defense Industrial Base

Cyberactivity consequences for the Defense Industrial Base

While the world’s eyes are on North Korea’s nuclear ambitions, their cyber program has been wreaking havoc. Last year, North...
Operational security vs. network security in the military

Operational security vs. network security in the military

As Deputy Secretary of Defense Patrick Shanahan is pushing for increased security in contractor networks, a new question is being...
Agencies get innovative to recruit cyber talent

Agencies get innovative to recruit cyber talent

Federal Chief Information Officers are always looking to expand their teams by hiring the best cybersecurity talent. However, finding this...
TSP scores low on information security audit

TSP scores low on information security audit

The Federal Retirement Thrift Investment Board’s security policies might need improvement. An audit performed by consulting firm Williams Adley gave...
Solving the hacker attribution problem

Solving the hacker attribution problem

Adept hackers are masters of misdirection. When cyberattacks occur, digital breadcrumbs provide evidence of the malicious computer’s origin. However, these...
DoD to set high standard for industry cybersecurity

DoD to set high standard for industry cybersecurity

At West 2018, Deputy Secretary of Defense Patrick Shanahan set an ultimatum for defense contractors: secure your data or lose...
Sec. Mattis considering ban on mobile devices at Pentagon

Sec. Mattis considering ban on mobile devices at Pentagon

Brig. Gen. Gregory Touhill, president of Cyxtera Federal Group, discusses the potential prohibition of smart devices that Secretary of Defense...
‘Whitelisting’ reemerges as innovative cyber strategy

‘Whitelisting’ reemerges as innovative cyber strategy

Eric Chudow, senior mitigation expert at the National Security Agency, discusses the cybersecurity strategy called “whitelisting,” and why it’s resurging...
Industry perspective on DHS’s CDM program

Industry perspective on DHS’s CDM program

Dan Carayannis, director of public sector at RSA Archer, Gregg Mossburg, senior vice president for strategic operations at CGI Federal...
Industrial systems warn of Spectre & Meltdown bugs

Industrial systems warn of Spectre & Meltdown bugs

Maria Horton, president and CEO of EmeSec, discusses how agencies can protect themselves against vulnerabilities from the Spectre & Meltdown...
Identity management and cyber initiatives in government

Identity management and cyber initiatives in government

Jeremy Grant, managing director of technology business strategy at Venable, discusses the role identity management plays in government.
Broken links in the VA’s physical security chain

Broken links in the VA’s physical security chain

Lori Rectanus, director of physical infrastructure issues at the Government Accountability Office, discusses how some of the 170-plus buildings managed...
NSA & U.S. Cyber Command await officials in top leadership roles

NSA & U.S. Cyber Command await officials in top leadership roles

Greg Otto, managing editor at CyberScoop, discusses the search for new top leadership at the National Security Agency and U.S....
IT Modernization Report & Trusted Internet Connections

IT Modernization Report & Trusted Internet Connections

Karen Evans, national director for the U.S. Cyber Challenge, discusses how the White House’s IT Modernization Report will impact the...
Federal government cybersecurity strategy & botnets

Federal government cybersecurity strategy & botnets

Bob Gourley, partner & co-founder at Cognitio, discusses how the federal government should deal with automated cyber threats, like botnets.