menu

Topic:

PR, Social Media and Govt 2.0

Censorship of Cyber Space: Lessons from Egypt

Censorship of Cyber Space: Lessons from Egypt The recent events in Egypt have shown the world just how powerful communication via the Internet, especially with social networking sites such as Facebook and Twitter, can be in disseminating news and organizing group actions. Likewise, the online blackout that occurred in Egypt for five days following the […]

Cybersecurity and Continuous Monitoring – A New Imperative

One of the most successful (I did not say perfect) cybersecurity programs in the Federal Government is being run by the Department of State. That is because they have about as close to a continuous monitoring system as possible. They are an example for the rest of the government. How has State done this?

The E-Battlefield: Taking Back the Web from Jihadists

The E-Battlefield: Taking Back the Web from Jihadists – IPT Blog
In a bold move to reclaim cyberspace from jihadi propagandists, global governments have recently committed to a comprehensive effort aimed at challenging on their own turf those who radicalize others, the New York Times reports.

Homeland Security moves full-speed-ahead on Einstein cybersecurity tool

Homeland Security moves full-speed-ahead on Einstein cybersecurity tool – NextGov
The Homeland Security Department will finish by 2012 installing a somewhat controversial system, called Einstein 2, that monitors traffic on federal computer networks for potential intrusions, and will start the next phase of the application, DHS Secretary Janet Napolitano said during an address on the state of the agency.

Cybersecurity Won't Get Solved at the UN

Every man, or nation, for themselves might be the best mantra for cybersecurity. The recently released results of a cyber summit organized by the EastWest Institute concluded as much. In short, an international treaty might be unattainable. The right approach to cyber governance is to begin with the premise that all national security challenges are a series of actions and counteractions between competitors, and inquiring how these competitions might progress in the future.

White House doesn't shine in cybersecurity grading

White House doesn’t shine in cybersecurity grading – Federal Computer Week
The Obama administration has received less-than-stellar marks in a recent report card on its cybersecurity policies, earning grades in the B to D range. The National Security Cyberspace Institute examined the administration’s record of cybersecurity accomplishments in a white paper published Jan. 18.

Web 2.0 And Disaster Recovery

Web 2.0 And Disaster Recovery – HSToday
For all its tragic devastation last year’s earthquake in Haiti may have had one silver lining, according to a new report from the non-profit Knight Foundation: the ushering in of “a new culture in disaster relief”, employing Web 2.0 technologies to speed response and mitigation.

FEMA To Use Social Media For Emergency Response

FEMA To Use Social Media For Emergency Response – Information Week
The Federal Emergency Management Agency plans to engage the public more in disaster response by sharing data and leveraging reports from mobile phones and social media, FEMA administrator Craig Fugate said today.

Cyber Market Poised to Grow in 2011

The Cyber Market writ large is well over $15 billion. Despite the seemingly well-informed and well-intentioned efforts of the Obama Administration, the large contracts (or lots of medium sized ones) most of the experts thought would begin to flow in 2010 quite simply did not happen. I expect this to break lose this year.

Customs Chief Defends Seizure Of Domain Names

Customs Chief Defends Seizure Of Domain Names – Tech Daily Dose
The head of the Homeland Security Department’s Immigration and Customs Enforcement agency Tuesday defended his agency’s aggressive efforts to combat online piracy and counterfeiting by seizing Internet domain names.