Tag Archives: cybersecurity

The Evolution of CYBERCOM

The Department of Defense faces tens of millions of attempted cyberattacks every year. In response, it established the U.S. Cyber Command in 2009 to more effectively address the growing risk of these threats. Although initially located within the U.S. Strategic … Continue reading

Image | Posted on by | Tagged , , , , , , , , , ,

Mission Accomplished? What DOD Needs to Do to Address Its Key Challenges

Defending the nation is no easy task. DOD faces a wide array of evolving threats. And more than a decade of warfare has taken its toll on DOD personnel and equipment. So where does that leave the Department? Today’s WatchBlog … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , ,

Vehicle Cybersecurity (podcast)

You may not have noticed, but your car is turning into a computer on wheels. Software now controls things like braking and steering, as well as hands-free calling and keyless entry. But if your car is like a computer, is … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

Government IT Systems Still at Risk

Lately, it’s a recurring news story—another hack, leak, or breach, and sensitive information is compromised. We’ve long identified information system security as a high-risk area throughout the government. So for October’s Cybersecurity Awareness Month, we’re highlighting federal cybersecurity challenges.

Image | Posted on by | Tagged , , , , , , , , , , , , , | 1 Comment

Video on Power Outages on Military Bases

The Department of Defense uses computer systems to control electricity, natural gas, and other utility services on its military installations. According to DOD, these systems could be vulnerable to cyber threats. In fact, security testers destroyed a generator in a … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

A Closer Look at Privacy as a High Risk Area – When Advancing Technology Meets Increasing Concerns

From online health care exchanges to mobile device location data, the privacy of personally identifiable information (PII) is a major concern when it comes to information technology. Today, we take a closer look at the privacy of PII, and why … Continue reading

Image | Posted on by | Tagged , , , , , , , , , ,

Watching Out for Federal Cybersecurity

The federal government relies on computer networks and systems to provide essential services affecting the health, economy, and defense of the nation. Incidents of hacking or cyber attacks place sensitive information at risk, with potentially serious effects on federal and … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , | 1 Comment

An Introduction to GAO’s Key Issues

Each year, we issue hundreds of reports on topics spanning the full breadth and scope of the federal government’s responsibilities. In fiscal year 2013, we issued 709 reports, made 1,430 new recommendations, and testified at 114 congressional hearings. We developed … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , , , , , | 1 Comment