Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Is Apple full of bugs?
Thursday - 7/22/2010, 5:27pm EDT
Cybersecurity Update - Tune in weekdays at 30 minutes past the hour for the latest cybersecurity news on The Federal Drive with Tom Temin and Amy Morris (6-10 a.m.) and DorobekInsider with Chris Dorobek (3-5 p.m.). Listen live at FederalNewsRadio.com or on the radio at 1500 and 820 AM in the Washington, D.C. metro area.
- We've all seen the Mac Guy make fun of the Windows Guy in the Apple ads. But a new assessment suggests Apple has its own security problems. Apple has topped Oracle as the company with the most flaws in its software. That the results from the latest report from security company Secunia. The report doesn't factor in the severity of the flaws, meaning that although Apple has the most vulnerabilities it's software isn't necessarily the most insecure in practice. CSO magazine reports that many of Apple's flaws are not in its operating system, but the flaws can be found in the other applications like Safari, QuickTime, and iTunes.
- The Defcon social engineering contest is scheduled to take place later this month. And the idea behind the contest is to test the schmoozing abilities, and organizations' ability to protect themselves. In the cyber-world, it is called social engineering, and it is one of the most significant issues in cyber-security. So the Social Engineering Capture the Flag contest will ask contestants to gather information and then plan a realistic and appropriate way that they could attack an organization. The goal is to highlight the realm of possibility, and use that information so organizations can protect themselves. The concept has spurred concern from a number of organizations, including government agencies, there might be some broader ramifications. CSO reports that some of the people who were going to participate have even been threatened with being fired if they do participate.Organizers say that the goal is to raise awareness, not to embarrass.