Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Website makes learning about cybersecurity fun
Thursday - 8/26/2010, 4:11pm EDT
- Getting people interested in learning about cybersecurity seems to be half the battle. We've been talking with the winners of the Department of Homeland Security's 2010 Cyber Awareness Challenge. Will McGill and Anna Squicciarini are assistant professors of information sciences and technology at Penn State. Their winning entry - called "CyberLink IT Games" - turns learning about cybersecurity into something they hope will be fun.
- We've learned that back in 2008 a network administrator's worst fear was realized by the Pentagon when an infected flash drive was inserted into a U.S. military laptop at a base in the Middle East. Deputy Secretary of Defense William Lynn tells Foreign Affairs, the flash drive's malicious computer code, which was put there by a foreign intelligence agency, uploaded itself onto a network run by U.S. Central Command. That code then spread undetected on both classified and unclassified systems. Lynn calls it the most significant breach of U.S. military computers ever, but perhaps more importantly he says it served as an important wake-up call. He says, the Pentagon's counter-attack, named Operation Buckshot Yankee, marked a turning point in U.S. cyberdefense strategy. He warns that more than 100 foreign intelligence organizations are currently trying to hack into the digital networks that support U.S. military operations, and that every day, U.S. military and civilian networks are probed thousands of times. The Deputy Secretary says the Pentagon is now working with allied governments and private companies to prepare itself for future threats. An enormous amount of foundational work remains, he says, but initiatives are in place to better protect U.S. interests, such as the creation of the the new U.S. Cyber Command.
Check out all of Federal News Radio's coverage of cybersecurity issues here.