Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
Cyberhacktivism threatens federal security
Tuesday - 4/20/2010, 9:25am EDT
- A new wave of cyber protest is threatening cyber security at the federal and corporate level. A new report by well-known botnet researcher Gunter Ollmann of computer security firm Damballa, looks at the recent trend toward politically motivated cyberprotests, sometimes called hacktivism. So far these organized attacks have been carried out against rival governments like Estonia and Georgia and large companies like Project Aurora, but the report warns these cyber-protests could be carried out by anyone. These attacks are difficult to defend because they don't necessarily involve true criminal behavior, and they could be carried out by their own customers. The growing popularity of social networks is making these target cyberprotests easier to organize and control, according to Ollmann. Darkreading.com says that as cyber protests continue to grow IT departments will have to set up some sort of counter attack.
- Could your old and discarded copier be a threat to your personal and corporate security? The answer is yes, according to new reports. Digital copiers built after 2002 are essentially computers that store an image of every document scanned, copied or emailed on a hard drive. Ever faxed your tax return from the office copier? Then your information is most likely stored on the hard drive. CBS reports the copier industry isn't stepping up about the hidden risk of personal identity theft.
- Keep a close eye on those passwords. It was a school-child, not a seasoned hacker, who broke into a Virginia school's record system. The school is Springhill Elementary in McLean, Virginia. And police say the 9-year old captured login credentials for the system from a teacher's desk and used the information to change passwords, homework assignments and class rosters. No charges have been filed.