Tag Archives: Greg Wilshusen

An Ongoing Risk: Cybersecurity Attacks at Federal Agencies

Similar to how new flu shots come out each year to combat new strains of the virus, agencies must routinely adapt their cybersecurity efforts to address evolving threats. In today’s WatchBlog, we look at the federal government’s approach to and … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Risky Business—Threats in the IT Supply Chain

Laptops aren’t like IKEA furniture—we usually buy them pre-assembled and ready to use. The life of a computer starts long before it’s purchased, though, and the process of creating and moving a computer from suppliers to users can create security … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

GAO’s Information Technology & Cybersecurity Team

GAO’s workforce is organized largely by subject area, with most employees working in one of our 15 mission teams. Today we’ll be putting the spotlight on our Information Technology & Cybersecurity (ITC) team, which helps the government respond to the … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , ,

IRS in Need of Better Controls to Safeguard Taxpayer Data

Every tax season, you send information to the IRS about your salary, marriage status, and other personal and financial information. We’ve looked at whether IRS has effective controls in place to protect the sensitive financial and taxpayer data in its … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , ,

December Podcast Roundup – Podcasts You May Have Missed

We were busy podcasting all last year! And if you’re not subscribed on iTunes or our RSS feed, you’re missing out. Today’s WatchBlog catches you up on podcasts you may have missed last month. Protecting the Electric Grid: Severe solar … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , ,

DHS Cybersecurity Workforce

Secure federal computer systems depend on the federal and contractor workforce who design, develop, implement, secure, maintain, and use them. But the federal government faces a persistent shortage of workers trained in cybersecurity and information technology. The Department of Homeland … Continue reading

Image | Posted on by | Tagged , , , , ,

Cybersecurity—New Risks and Threats

Picture this: Atlanta’s municipal information system was hit with a cyberattack that prevented customers from accessing multiple applications, including paying bills and viewing court-related information. The Department of Justice reported indicting nine Iranians for a massive cybersecurity theft campaign on … Continue reading

Image | Posted on by | Tagged , , , , , , , ,

Who Let the Watchdogs Out? We’re on Location Discussing the Internet of Things (video podcast)

Have you ever used a fitness tracker to measure your daily steps? Or adjusted your home thermostat from your phone? If you answered yes, then you’ve experienced the Internet of Things. If you haven’t heard the term before, the Internet … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , ,

Securing the Nation’s Most Sensitive Information (podcast)

High-impact federal information systems hold sensitive information, which, if lost, could cause catastrophic harm to individuals, the government, and the nation. We recently surveyed federal agencies about cyber threats to high-impact systems and efforts to protect them. Listen to Greg … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Weaknesses in IRS Information Security (podcast)

To do its job, the IRS has to collect and keep a variety of sensitive information about taxpayers. But how does it make sure this information is secure? Listen to Greg Wilshusen, a director in our Information Technology team, discuss … Continue reading

Image | Posted on by | Tagged , , , , , ,