bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
5:47 am, August 28, 2014

Search Result

Search Tags:  CSIS

Could we be hacked back in time?

Looking at real threats in an ether-based world

Tags: security , technology , cybersecurity , infrastructure , Greg Garcia , Garcia Strategies , DHS ,

Friday - 04/10/2009, 01:21pm EDT
Listen

Securing Cyberspace

Jim Lewis
CSIS,
April 2, 2009

Tags: tech , Federal Security Spotlight , Jim Lewis , ecuring Cyberspace for the 44th Presidency

Wednesday - 04/01/2009, 01:26pm EDT

New guidelines to close 20 biggest cyber holes

The guidelines, issued Monday by public and private sector cybersecurity experts, are considered the low-hanging fruit to help agencies improve their network security immediately, says John Gilligan, a former Air Force and Energy Department chief information officer.

Tags: technology , Sen. Tom Carper , State , DHS , NSA , Energy , Air Force , CIO Council , SANS Institute , Alan Paller , John Gilligan , Jim Lewis , cybersecurity , FISMA

Monday - 02/23/2009, 08:43pm EST
Listen

The Medium Squeeze

Tags: contract , tech , Jason Miller , contracts

Thursday - 02/12/2009, 06:37pm EST
Listen

Symbols and Signals

Tags: newsstand , Iran , agenda , James Lewis ,

Tuesday - 02/10/2009, 10:28am EST
Listen
  •  
  • 9