bnv.fnr.news/technology;cybersecurity=main;tile=1;pos=top;sz=728x90,970x90;ord=
9:43 pm, October 24, 2014

Cybersecurity News

DHS official Bruce McConnell to return to private sector

Bruce McConnell announced today his intention to leave the Homeland Security Department in August after spending more than four years in an assortment of senior cybersecurity positions. He will be third senior ranking cyber official at DHS to leave since January.

Thursday - 07/18/2013, 03:13pm EDT

Wall Street Conducts cyber drill

Cyber-attacks on banks are growing more frequent. Wall Street has just conducted a cyber-defense exercise called "Quantum Dawn 2,". During the drill, bank employees were stationed at their normal offices, and were emailed throughout the day with bits of information that could indicate an encroaching hacker attack. They monitored a simulated stock exchange for irregular trading and were pressed to figure out what was going on and how to react while sharing information with regulators and each other.

Thursday - 07/18/2013, 01:23pm EDT

Center watches cyber threats

Ever hear of the Multi-State Information Security and Analysis Center? It's a division of the Center for Internet Security. Their focus is cyber threat prevention, protection, response and recovery for state, local territory and tribal governments. Their objectives iclude providing two-way sharing of information and early warnings on cyber security threats, dissemination of information on cyber security incidents, to promote awareness and coordinate training.

Thursday - 07/18/2013, 01:20pm EDT

Cyber warriors are targets

Will exploit developers become potential targets of state-sponsored assassinations in the future -like the nuclear scientists in recent times? There's been some discussion in the "Tech" community regarding the legitimacy of using lethal force against civilian hackers. As a result some are wondering what the future might hold for exploit developers and other members of the cyber supply chain who are facilitating state-funded, offensive cyber operations.

Thursday - 07/18/2013, 01:19pm EDT

What are hackers after

We hear a lot about zero-day attacks and system vulnerabilities, but most hackers look for easier enterprises like the application used to access the Web. That's the one most online attackers will target. Why? Because most attackers and online exploit kit designers realize that the common browser is usually an endpoint's weakest link. Not only are enterprises generally slow to keep up with browser patching, they're downright sluggish at updating plug-ins and extensions.

Thursday - 07/18/2013, 01:17pm EDT

CMS, IRS promise to meet cybersecurity requirements to protect Affordable Care Act data

While leaders at CMS said the hub connecting personal information stored in the health insurance marketplace to multiple agencies will be ready by the Oct. 1 deadline, legislators are concerned with how well CMS is securing individuals' personal information from cyber threats.

Wednesday - 07/17/2013, 08:31pm EDT

On DoD: Doney aims to shake up how DIA brings new technology on board

Dan Doney, the new chief innovation officer at the Defense Intelligence Agency, talks about the agency's plan to change the way it interacts with industry and brings innovation to government.

Wednesday - 07/17/2013, 05:55pm EDT
Listen

NIST proposes first federally funded cyber research center

NIST and the National Cybersecurity Center of Excellece (NCCoE) want to facilitate public-private collaborations surrounding cybersecurity solutions by creating a new research-and-development center.

Tuesday - 07/16/2013, 03:23pm EDT

The Cybersecurity Imperative

All agencies are fighting cyber-attacks. The FBI Director of Cyber Security believes there are two groups of organizations: those whose systems have been attacked and those who do not know they have been attacked. In the federal space, the velocity and variety of attacks has dramatically increased. With Advanced Persistent Threats (APT), the time it can take to comprise a system ranges from hours to days, yet the time it takes for its discovery averages 6 months. The cyber security solution has shifted from the perimeter (firewall) or how to stop the attacks to how to deal with the attacks after they occur. The emphasis is now on the controls and minimizing what the attacker is doing once he gets in. The cost of the attacks is down time and data loss. With a 200% to 300% increase in attacks on agency's systems, it is imperative the federal government implements a holistic solution including hardware, software, training and compliance.

Tuesday - 07/16/2013, 11:21am EDT
Listen

Chinese hackers identified

Earlier this year information security firm Mandiant identified a previously unknown group hackers thought to be in China. "People referred to China or Chinese hackers, but there was plenty of wiggle room there to assume it could be a collection of guys working in someone's basement without a tie to the government," Richard Behtlich chief security officer for Mandiant. The group the identified is called Unit 61398. Bejtlich says, "we showed pretty conclusively that at least this one group is part of the PLA" AKA The Chinese People's Liberation Army.

Monday - 07/15/2013, 10:44am EDT

OPM hopes cyber-job database will help agencies fill workforce gaps

As the cybersecurity workforce gets older and closer to retirement age, the Office of Personnel Management is trying to help agencies find new talent. It's creating a new database of cyber positions that it hopes will help agencies identify the cyber skill sets needed to meet their missions. The Obama administration has made reducing critical cyber workforce gaps one of its top "cross-agency" goals.

Friday - 07/12/2013, 04:24pm EDT

Police warned about hackers

Law enforcement and first responders have been put on notice --their mobile phones are targets for hackers. They've been informed in roll call bulletins that hackers, by compromising mobile technology and exploiting vulnerabilities in portable operating systems, application software, and hardware. Compromise of a mobile device can have an impact beyond the device itself; malware can propagate across interconnected networks.

Tuesday - 07/09/2013, 03:54pm EDT

FedRAMP, IT security, and the cloud

Alex Grohmann and John Dyson from the Northern Virginia Chapter of the Informations Systems Security Association, join host John Gilroy to talk about what you can do to make your agency more secure.
July 9, 2013

Monday - 07/08/2013, 06:47pm EDT
Listen

DoD's revised cyber policy to shift toward governmentwide standards

Department will move away from DoD-specific approaches to cybersecurity, lean more toward informing and relying on governmentwide efforts.

Monday - 07/08/2013, 06:00am EDT

EDA's overreaction to cyber attack highlights every agency's challenge

The Commerce Department's Economic Development Administration spent almost $3 million to remediate a cyber attack that really didn't happen. Commerce's inspector general found the attack infected only two outgoing email servers and not more than half of EDA's systems. Two cybersecurity experts say other agencies can learn from EDA's year-long unnecessary and expensive recovery.

Monday - 07/08/2013, 05:34am EDT

SBA relying on shared services to improve cyber posture

Chase Garwood, the SBA acting CIO, said the agency is working with DHS and Justice to improve the security of its internal and external customer-facing systems.
July 4, 2013

Thursday - 07/04/2013, 10:11am EDT
Listen

Federal mobile apps lack standard security processes

DHS, DISA and GSA are heading down similar but different paths to ensure mobile apps are secure before being allowed on devices or networks. NIST is developing voluntary guidelines to improve mobile software security based on work done in other industry sectors.

Wednesday - 06/26/2013, 05:18am EDT
Listen

2013 AFCEA International Cyber Symposium

Cyber threats and challenges grow every day. Successfully defending our networks requires a team approach. With this in mind, the 2013 Cyber Symposium will engage the key players, including the U.S. government, the international community, industry and academia, to discuss the development of robust cyberspace capabilities and partnerships.

Tuesday - 06/25/2013, 06:21pm EDT

Sequestration claims another conference: DHS' GFirst cyber event

U.S. CERT said in an email to organizers the current budgetary environment wouldn't support the annual cybersecurity conference

Wednesday - 06/19/2013, 06:24pm EDT

Army IT Agency showing the value, potential of emerging technologies

Greg Garcia, the director of the Army's IT Agency, said the organization has been piloting a virtualized desktop initiative and almost is ready to move into full production.

Wednesday - 06/19/2013, 11:27am EDT
Listen
  •  
  • 17
  •