Tag Archives: cyber attack

Mission Accomplished? What DOD Needs to Do to Address Its Key Challenges

Defending the nation is no easy task. DOD faces a wide array of evolving threats. And more than a decade of warfare has taken its toll on DOD personnel and equipment. So where does that leave the Department? Today’s WatchBlog … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , ,

The National Cybersecurity Protection System (podcast)

With cyberattacks on the rise, protecting federal government computer systems, the infrastructure they control, and the private data stored within them is of the utmost importance. The National Cybersecurity Protection System is intended to help—but how well is it working? … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , ,

Lights out? Cyber Threats to DOD Utilities

Nobody likes being in the dark. Some people invest in a generator or at least some candles for the occasional outage. But what if you’re the Department of Defense, and instead of bad weather knocking out the water or power, … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

Video on Power Outages on Military Bases

The Department of Defense uses computer systems to control electricity, natural gas, and other utility services on its military installations. According to DOD, these systems could be vulnerable to cyber threats. In fact, security testers destroyed a generator in a … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

A Closer Look at Privacy as a High Risk Area – When Advancing Technology Meets Increasing Concerns

From online health care exchanges to mobile device location data, the privacy of personally identifiable information (PII) is a major concern when it comes to information technology. Today, we take a closer look at the privacy of PII, and why … Continue reading

Image | Posted on by | Tagged , , , , , , , , , ,

Podcast on FAA Air Traffic Control Systems and Information Security

The Federal Aviation Administration relies on a vast array of increasingly interconnected systems and networks for air traffic control. Protecting these systems from internal and external threats is essential to ensuring safe, orderly, and efficient travel through our international air … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

Fiscal Exposures: 5 Sources of Risk that Drive Future Spending

In tandem with today’s release of our audit of the federal government’s fiscal year 2014 consolidated financial statements, we want to highlight our work on fiscal exposures. This is a term that describes services or expenditures that Americans may expect, … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , | 2 Comments