Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
DISA laid out its vision in a new five-year strategy. It said it will work with the U.S. Cyber Command to build up the Pentagon's cyber defenses.
FBI officials said the bureau never asked for and never possessed the database that the group, which calls itself AntiSec, is posting on a website.
McAfee says Android devices are the most vulnerable. Twitter has become one of the major threat vectors.
Former White House cybersecurity czar Howard Schmidt said the president should sign an executive order directing agencies to tighten cybersecurity measures.
The vulnerability has been used in recent days to attack and disable Windows PCs.
Hackers are using official Defense Department seals in an online scam.
One third of Americans say they avoid cloud computing because of cybersecurity risks, according a survey conducted by Citrix. But more than half of the respondent say they don't even know what cloud computing is. The survey found a majority of respondents said they think the cloud is actually the "fluffy white thing" that floats around the sky.
Some security experts are telling organizations, including government agencies, to disable or even uninstall Java software running on Web browsers.
The Air Force is looking for fresh ways to attack enemies in cyberspace, specifically to destroy, deceive or corrupt their networks.
The Republican Party platform criticized President Barack Obama for not doing enough to avert automatic budget cuts set to hit the Defense Department in January. The plan, which was unveiled Tuesday, also called for greater public-private collaboration on cybersecurity and recommended an overhaul of the Veterans Affairs Department.
The company will join the General Dynamics Advanced Information Systems Division.
Sen Diane Feinstein (D-Calif.) called on President Obama to issue an executive order on cybersecurity rather than wait for Congress to act on legislation under consideration.
The world's largest oil producer said its network has recovered from a malicious computer virus.
The National Institute of Standards and Technology wants comments on new draft guidelines for securing Basic Input Output System systems. BIOS is the first software activated after turning a computer on and has increasingly become a new target for hackers.
A proposed rule would make contractors responsible for securing networks that store any type of government information. It defines key terms like information and "information system."
Marine Lt. Gen Richard Mills told an audience at a conference in Baltimore last that he led cyber attacks in Afghanistan.
The plan calls for the creation of two new bodies. The Cyber Investment Management Board would oversee cyber acquisition, and a Cyber Capabilities Team would look at technology and policy requirements.
Maj. Gen. John Davis moves up from the position of director of current operations at the Cyber Command.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command
The fixes plug vulnerabilities in Flash Player. If left untreated, they could cause a system crash or allow attackers to take control of a computer.