bnv.fnr.news/technology;cybersecurity=stories;tile=1;pos=top;sz=728x90,970x90;ord=
3:02 pm, September 30, 2014

Cybersecurity News

Army gets the green light for major IT security reorganization

Congress approves a $175 million spending package that will let the Army move ahead with plans to consolidate 400 IT security watchtowers down to around a dozen. The cyber initiative is part of broader effort to move the entire DoD toward the Joint Information Environment.

Wednesday - 09/25/2013, 05:46am EDT
Listen

DHS continuous monitoring program faces legislative, budget challenges

Suzanne Spaulding, the nominee to be the deputy undersecretary of the National Protection and Programs Directorate, told Senate lawmakers DHS had to reduce the number of federal devices that will be covered by the CDM program because of budget shortfalls.

Friday - 09/20/2013, 07:34pm EDT

The 2013 Executive Leadership Conference

Jim Williams and Rick Holgate from ACT-IAC will fill us in on next month's 2013 Executive Leadership Conference in Williamsburg Virginia.
September 17, 2013

Tuesday - 09/17/2013, 10:57pm EDT
Listen

US safer 12 years after 9/11, but threat has evolved, experts say

While the threat of a Sept. 11-style attack may not be as great, terrorism, either of the lone-wolf or state-sponsored variety, still poses a threat to the U.S. Agencies are moving to protect themselves in areas such as cybersecurity.

Wednesday - 09/11/2013, 04:20pm EDT
Listen

The human aspect of security

Terry Gudaitis , owner/principal of Mindstar Security discusses how social media impacts security at your agency.
September 10, 2013

Tuesday - 09/10/2013, 10:35pm EDT
Listen

Intel Community offers first glimpse of future IT tools, network

The Office of the Director of National Intelligence said the lead agencies under the IC IT Enterprise program launched a standard desktop, a secure community cloud and an apps store in mid-August. Al Tarasiuk, the assistant DNI and intelligence community chief information officer, said the key to this effort was having an ICwide agreed-upon security architecture and policies.

Tuesday - 09/10/2013, 09:00am EDT
Listen

Energy ups number of employees at risk after cyber attack to 53,000

The Department of Energy first reported in August 14,000 current and former employees had their Personally Identifiable Information stolen. The department now says that number is nearly four times what it had originally thought.

Thursday - 09/05/2013, 11:52am EDT

Marine website hacked, redirected to message from Syrian Electronic Army

Marines' recruiting website redirected to pro-Assad message

Monday - 09/02/2013, 06:20pm EDT

Napolitano talks cyber, terrorism in farewell address

In her farewall remarks Tuesday, DHS Secretary Janet Napolitano said security improvements have made the U.S. safer. She will leave her position Sept. 6.

Tuesday - 08/27/2013, 05:32pm EDT

DoD to unite IT, building control systems along same cyber lines

The Defense chief information officer is expected to update one directive to expand the number and type of devices that must meet the military's cybersecurity requirements. The Pentagon also will issue a second revised directive to move DoD closer to civilian agencies around risk management of IT systems.

Thursday - 08/22/2013, 05:55am EDT
Listen

DHS pitches cyber projects to Silicon Valley, eyes commercialization

Eight cutting-edge technologies developed by the government are being shown off this week to venture capitalists and investors in Silicon Valley, with the hope of attracting someone to take the applications to market.

Wednesday - 08/21/2013, 05:48am EDT
Listen

DHS appoints Schneck to senior cyber position

Phyllis Schneck is the new deputy undersecretary of cybersecurity in the National Protection and Programs Directorate at DHS. She replaces Mark Weatherford, who left in April.

Monday - 08/19/2013, 10:45am EDT

Hackers break into Energy's computer networks, put employees at risk

The Energy Department confirmed 14,000 current and former employees are at risk of identity theft as cyber attackers gained access to their personal information. This is at least the second hacking incident this year.

Friday - 08/16/2013, 04:36pm EDT

Manning takes stand, apologizes for hurting US

Army Private Bradley Manning apologizes for giving classified documents to WikiLeaks. His sentencing hearing is raising questions about Army commanders' ability to spot mental health issues.

Thursday - 08/15/2013, 10:17am EDT

DoD 'sprints' toward IT acquisition, accepts more risk

The director of the Defense Information Systems Agency says the agency will spend the next year focusing on a faster, more agile acquisition process to accelerate the way it delivers technology, rather than letting procurements drag on for years.

Thursday - 08/15/2013, 05:56am EDT
Listen

Security leaks could affect legislation

Recent revelations about secret U.S. surveillance programs could significantly impede progress on negotiations over new laws and regulations meant to beef up the country's defenses against the growing threat of cyber-attacks. Current and former cyber security officials say they worry the ongoing disclosures about secret National Security Agency spying programs by former NSA contractor Edward Snowden could trigger knee-jerk reactions by Congress or the private sector.

Tuesday - 08/13/2013, 12:32pm EDT

How does DHS respond to Cyber incidents?

How does DHS detect and respond to malicious cyber activity. DHS also operates a cyber-information coordination center, the National Cybersecurity and Communications Integration Center (NCCIC), and several operational units. These units respond to incidents and provide technical assistance to information system operators. The NCCIC coordinates the information collected through these channels to create a common operating picture for cyber communities across all levels of government and the private sector.

Tuesday - 08/13/2013, 12:30pm EDT

Is your computer vulnerable?

How do you know if your computer is vulnerable to cyber-attack? USCERT The U.S. Computer Emergency Readiness Team. says many computers are sold with software already loaded. Whether installed by a computer manufacturer, operating system maker, Internet Service Provider, or by a retail store, USCERT says the first step in assessing the vulnerability of your computer is to find out what software is installed and how one program will interact with another. Unfortunately, it is not practical for most people to perform this level of analysis.

Tuesday - 08/13/2013, 12:29pm EDT

Understanding DHS's role in cyber security

What is DHS's role in cyber security. DHS uses intrusion detection tools to monitor .gov network traffic for malicious activity and uses this resulting data to address cyber vulnerabilities. In addition, DHS issues bulletins and alerts that provide information on potential cyber threats. Last year, DHS issued more the 5,000 alerts and advisories, which it shared with various government, private sector, and critical infrastructure stakeholders; as well as the public.

Tuesday - 08/13/2013, 12:27pm EDT

Looking inside cyber-criminal organizations

Cyber criminals --what's their M.O.? USCERT says Attackers focus on exploiting client-side systems (your computer) through various vulnerabilities. They use these vulnerabilities to take control of your computer, steal your information, destroy your files, and use your computer to attack other computers. A low-cost way attackers do this is by exploiting vulnerabilities in web browsers. An attacker can create a malicious web page that will install Trojan software or spyware that will steal your information.

Tuesday - 08/13/2013, 12:26pm EDT
  •  
  • 14
  •