by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : April 15, 2014
SM is FCC Chairman Tom Wheeler's target for sharing DOD spectrum in the 3.5 GHz band 18 months Persuading federal IT managers to adopt continuous diagnostics and miti- gation is one of the most challenging elements of implementing the cyber- security technology, according to IT leaders at the forefront of spreading the CDM message across government. Although federal agencies are beginning to grasp what CDM can do for their organizations, risk-averse IT managers still must be won over, say IT leaders at the General Services Admin- istration and the departments of Home- land Security and Energy. During a discussion forum in March, DOE CIO Robert Brese said his depart- ment presents a complex test for spreading the CDM gospel. DOE s national labs, with their complement of world-class technology researchers, can operate "like independent city-states" that require customized solutions. "It s a huge challenge to change the culture," he said. But "CDM is making good progress. It s been accepted at the labs," and DOE has moved from the initial compliance mode to "press the I believe button." The technology provides a steady ow of security data to enable agencies to identify and mitigate threats quickly and ef ciently. In January, GSA awarded the rst $60 million in task orders under the $6 billion CDM contract, which GSA and DHS jointly administer for federal agen- cies. DHS is also helping agencies install and implement the technology, said Jeff Eisensmith, chief information security of cer at DHS. The standardized set of hardware, software and capabilities under CDM supports a more ef cient, team-oriented approach to attacking problems, he added. Brese said the technology can free agencies from hidebound, rote secu- rity practices to take a longer, enter- prisewide view of their cybersecurity needs. "Not all vulnerabilities are equal," he said. "Say you have three bald tires. One is on your car, the other is tied onto a frayed rope on a tree swing in your front yard your three-year-old child is using, and the last is stored in the garage. The threats are there, but they aren t the same." Eisensmith said CDM will enable managers to differentiate among threats and prioritize them in terms of the agency s mission. "Nine-tenths of my job is explaining the business side of security...[and] building business cases for the C-suite," he added. "It s a cost- avoidance discussion." --- Mark Rockwell In search of buy-in for continuous monitoring April 15, 2014 FCW.COM 11
March 30, 2014
April 30, 2014