Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Honeystick Project? Zero Day? BYOD?
Tuesday - 12/18/2012, 9:56pm EST
December 18, 2012 -- This week on "Federal Tech Talk", Gigi Schumm, vice president and general manager Public Sector of Symantec, joins host John Gilroy to talk about how to protect your agency or company from cyber attacks.
Nobody can keep up the radical changes in computer security.
During the interview, Schumm discusses the changing concept of a virus being "in the wild."
Years ago, organizations would be able to list the number of malicious exploits; today, the number changes so fast it is impossible to list them.
Symantec has several centers for monitoring cyber-attacks, one is located in Herndon, Virginia.
Schumm talks about how Symantec merged with a company called RipTide to get an overview of how attacks were developing.
This overview enables security professionals at Symantec to develop heuristic methods of warning about activities.
Most federal IT professionals have heard of the old exploit where a few thumb drives were "lost" in a parking lot and employees would take them inside and plug them into a computer.
Schumm talks about a similar exploit called "honeystick."
Instead of "losing" thumb drives, Symantec "lost" smart phones that were loaded with apps and geographic tracking software.
Nobody has all the answers when it comes to security these days, it is always good to listen to a fresh perspective from a trusted vendor.