Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Is Apple full of bugs?
Thursday - 7/22/2010, 5:27pm EDT
Cybersecurity Update - Tune in weekdays at 30 minutes past the hour for the latest cybersecurity news on The Federal Drive with Tom Temin and Amy Morris (6-10 a.m.) and DorobekInsider with Chris Dorobek (3-5 p.m.). Listen live at FederalNewsRadio.com or on the radio at 1500 and 820 AM in the Washington, D.C. metro area.
- We've all seen the Mac Guy make fun of the Windows Guy in the Apple ads. But a new assessment suggests Apple has its own security problems. Apple has topped Oracle as the company with the most flaws in its software. That the results from the latest report from security company Secunia. The report doesn't factor in the severity of the flaws, meaning that although Apple has the most vulnerabilities it's software isn't necessarily the most insecure in practice. CSO magazine reports that many of Apple's flaws are not in its operating system, but the flaws can be found in the other applications like Safari, QuickTime, and iTunes.
- The Defcon social engineering contest is scheduled to take place later this month. And the idea behind the contest is to test the schmoozing abilities, and organizations' ability to protect themselves. In the cyber-world, it is called social engineering, and it is one of the most significant issues in cyber-security. So the Social Engineering Capture the Flag contest will ask contestants to gather information and then plan a realistic and appropriate way that they could attack an organization. The goal is to highlight the realm of possibility, and use that information so organizations can protect themselves. The concept has spurred concern from a number of organizations, including government agencies, there might be some broader ramifications. CSO reports that some of the people who were going to participate have even been threatened with being fired if they do participate.Organizers say that the goal is to raise awareness, not to embarrass.