Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
The mysterious Gauss cyber-surveillance malware has experts stumped. Kaspersky Lab, a Moscow-based security vendor, has been dissecting Gauss.
Anti-Leaks launched its attack just as Wikileaks began releasing information on a secret government surveillance program, Government Computer News reports.
Timothy Ryan joins Kroll Advisory Solutions as managing director.
Listen August 14th at 12pm
Program will discuss Progress Report on CyberSecurity in the Federal Government, Top CyberSecurity Priorities , Key Challenges to still overcome in IT Security, Lessons Learned , and a Vision for The Future
The Energy Department is asking electric utilities to make cybersecurity a top priority. It called for a cybersecurity governance board that would share information with the DoE.
The secret-busting organization WikiLeaks says it's been the victim of a sustained denial-of-service attack which has left its website sluggish or inaccessible for more than a week.
The FBI is warning the public of a new "drive-by" virus that is sending fake messages that appear to be from federal agencies.
Most IT managers are moving data to the cloud, but 40 percent of them believe doing that will weaken security of that data.
A new computer virus tied to some of the most sophisticated cyberweapons thus-far discovered has been found circulating in the Middle East, a Moscow-based computer security company said Thursday. If a link were confirmed, the find would expand the electronic arsenal reportedly deployed by the U.S. and Israel against their rivals in the region.
Instead of using a lengthy security technical implementation guide approval process to decide which tablets and smartphones will be allowed to use its network, the Defense Information Systems Agency wants to put the ball in the vendors' court.
An updated how-to guidance for responding to cyber incidents is out.
President Barack Obama may use his authority to issue orders compelling or encouraging private industry to meet minimum security standards to protect their computer networks from attacks by hackers or foreign governments, White House counterterrorism adviser John Brennan said Wednesday.
F-Secure analyzed 19 new families of mobile malware. It found a big increase in products that target Android.
The National Institute of Standards and Technology is making it easier for agencies to test the use of logical access control for applications.
Auditors found no security weaknesses that present an immediate threat to the jobs portal or user information housed in its database. The test represented the site's first independent security evaluation since OPM took control over USAJobs.gov from Monster Government Solutions in Oct. 2011. Under MGS management, hackers broke into the portal twice in 17 months.
Department says 99 percent of laptops now are encrypted. Of the 21 laptops reported stolen or missing in the last two months, all were secured with security software.
On this week's Bloomberg Government Capital Impact show, analysts will discuss which cybersecurity companies are being targeted for mergers and acquisitions. Plus, what's next in the internet tax debate and how are companies benefiting from the R&D tax credit.
August 2, 2012
The Senate failed Thursday to pass legislation to protect the U.S. electrical grid, water supplies and other critical industries from cyberattack and electronic espionage, despite dire warnings from top national security officials about the potential for devastating assaults on American computer networks.
The Social Security numbers and bank routing numbers of about 8,000 accounts were exposed in a cyber breach of an Environmental Protection Agency database.
A battle over the role companies should play in keeping the U.S. safe from cyber attacks threatens to kill cybersecurity legislation in the Senate