Cyber Policy

  • Federal CIO Tony Scott  (Photo: Robert Severi for FCW)

    Can Tony Scott get it all done?

    The U.S. CIO has made a mantra of "land the planes" and pushed notable improvements in his first nine months. But the to-do list for 2016 is long indeed. 11/24/2015

  • OPM looks to wrap breach notification by early December

    With some 14 million letters already out and millions more expected to hit mailboxes by the end of the month, the Office of Personnel Management expects to wrap up notifications to breach victims in the coming weeks. 11/24/2015

  • Shutterstock image: cyber eye.

    How to identify cyberattacks early and limit damage

    A focus on real-time analytics is necessary to gain a long-term information advantage over attackers. 11/23/2015

  • 2015 Rising Star Awards

    Katherine Mullins

    Katherine Mullins has been instrumental in enabling all levels of government to communicate securely via the Homeland Security Information Network. 11/23/2015

  • Rising Star 2015

    Michael Wheeless

    Michael Wheeless successfully demonstrated that commercial smartphones and tablets could connect securely from Navy ships to networks back ashore. 11/23/2015

  • 2015 Rising Star Awards

    Nicholas Keshavarz-Nia

    Noblis' Nicholas Keshavarz-Nia led development and deployment of an automated continuous monitoring solution that he now uses to support FedRAMP. 11/23/2015

  • Shutterstock image (by Sergey Nivens): Security concept, lock on a digital screen.

    IG: State lax on information security

    A newly released audit concludes that the State Department is not complying with federal information security standards and has failed to fully implement a continuous monitoring strategy. 11/20/2015

  • Shutterstock image: shadowed hacker.

    Critical infrastructure regulators need to improve cyber metrics

    According to a recent Government Accountability Office study, sector-specific agencies need to do a better job of measuring cyber risks to private-sector critical infrastructure. 11/20/2015

  • Wikimedia image: U.S. Office of Personnel Management seal.

    IG: OPM still vulnerable to cyber attacks

    The Office of Personnel Management's lack of compliance with the Federal Information Security Modernization Act leaves it vulnerable to another cyberattack, according to an audit from the agency's internal watchdog. 11/19/2015

  • Shutterstock image (by deepadesigns): Safety concept, closed padlock on a digital background.

    IG finds lapses in DHS IT security

    An audit of fiscal 2015 information security practices noted progress but found that DHS components did not maintain their security programs on a continuous, year-round basis. 11/19/2015

  • Shutterstock image (by a-image): Internet of Things (IoT) concept icon.

    Getting government ready for the Internet of Things

    A new study urges agencies to embrace the IoT while also instituting adequate security and privacy protections. 11/19/2015

  • Is it time to regulate the automotive Internet?

    Despite sensational media reports about cyber vulnerabilities, Congress and federal officials appear to be in the slow lane when it comes to regulating connected cars. 11/19/2015

The Fed 100

Nominations for the 2016 Federal 100 Awards are now being accepted. 

More from 1105 Public Sector Media Group