Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
One third of Americans say they avoid cloud computing because of cybersecurity risks, according a survey conducted by Citrix. But more than half of the respondent say they don't even know what cloud computing is. The survey found a majority of respondents said they think the cloud is actually the "fluffy white thing" that floats around the sky.
Some security experts are telling organizations, including government agencies, to disable or even uninstall Java software running on Web browsers.
The Air Force is looking for fresh ways to attack enemies in cyberspace, specifically to destroy, deceive or corrupt their networks.
The Republican Party platform criticized President Barack Obama for not doing enough to avert automatic budget cuts set to hit the Defense Department in January. The plan, which was unveiled Tuesday, also called for greater public-private collaboration on cybersecurity and recommended an overhaul of the Veterans Affairs Department.
The company will join the General Dynamics Advanced Information Systems Division.
Sen Diane Feinstein (D-Calif.) called on President Obama to issue an executive order on cybersecurity rather than wait for Congress to act on legislation under consideration.
The world's largest oil producer said its network has recovered from a malicious computer virus.
The National Institute of Standards and Technology wants comments on new draft guidelines for securing Basic Input Output System systems. BIOS is the first software activated after turning a computer on and has increasingly become a new target for hackers.
A proposed rule would make contractors responsible for securing networks that store any type of government information. It defines key terms like information and "information system."
Marine Lt. Gen Richard Mills told an audience at a conference in Baltimore last that he led cyber attacks in Afghanistan.
The plan calls for the creation of two new bodies. The Cyber Investment Management Board would oversee cyber acquisition, and a Cyber Capabilities Team would look at technology and policy requirements.
Maj. Gen. John Davis moves up from the position of director of current operations at the Cyber Command.
Military's cyber offense and defense strategies are being executed by two separate teams that can't sufficiently share knowledge, per the commander of U.S. Cyber Command
The fixes plug vulnerabilities in Flash Player. If left untreated, they could cause a system crash or allow attackers to take control of a computer.
If the claims are true, it means hackers could spy on network traffic, obtain credentials to get on the inside and attack the power plants.
The research agency DARPA is hosting a daylong event Sept. 27 on its upcoming "Plan X" that focuses on building solid attack strategies and tools.
The department is trying to figure out the best way to manage the cards of contract employees after they leave the department. Every agency using a managed service provider for secure identity card issuance faces a similar challenge. Commerce also is working on integrating physical and logical access systems.
Sources say the Defense Department is behind on implementing the new plan and may in fact be exploring other options.
The Army chief information officer said the military service was well on its way to completely migrating to the cloud-based email by March.
The military, working through DARPA, is trying to develop its own marketplace of apps for helping troops in the field.