Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: Cyber
If the lock to your house required special training to work, you'd be more likely to take your chances and leave the place unlocked. That's how it is with cyber security. If security procedures and systems are too complicated, users tend to skip them. But research at the National Institute of Standards and Technology is establishing a link between usability and security and will make the results available this summer to federal agencies.
Uh oh. It's happened again. A hard drive containing a terabyte of personally identifiable information has gone missing. It disappeared from a lab desk inside the National Archives in College Park, Maryland. The disk housed social security numbers of Clinton White House visitors and of the Gore family. Once again proving that the insider threat is as potent as any attack launched from overseas. I'm Tom Temin.
The Cybersecurity Enhancement Act is making its way through the House.
Program discusses the progress on CyberSecurity with the DHS-DoD & ODNI.
Tags: technology , Federal Executive Forum , cyber security , DHS , DoD , ODNI , cyber , security , Greg Schaffer , Dave Wennergren , Priscilla Guthrie , Lee Holcomb , Robert Dix , Tom Conway , McAfee , Juniper Networks
Tags: technology , Federal Executive Forum , cyber security , DHS , DoD , FAA , cyber , security , Robert Lentz , Greg Schaffer , Dave Bowen , Fred Newberry , Cisco , John Bordwine , Symantec , Sam Chun , EDS , Jim Flyzik , Flyzik Group
October 5th, 2011
How far have we come and what are our biggest challenges—and opportunities—ahead as Cybersecurity comes of age? Hear what Lt. General Harry Raduege. Jr. and Karen Evans have to say about this compelling discussion.
In about 18 months a new military cyber command should be up and running. Secretary of Defense Robert Gates signed a memo yesterday instructing the U.S. Strategic Command to start the planning process. The command will coordinate the Pentagon's efforts to defend its networks and conduct cyber warfare. The new command is expected to be based at be located at Fort Meade. The decision to launch the unit verifies the growing concern about the nation's cyber vulnerabilities.
How safe are the nation's critical networks? Several years ago Chinese hackers were caught trying to break into sensitive government and military systems. They've progressed from that to Congress. Last year, two members of Congress said their systems had been hacked into and sensitive information destroyed. The news that they struck again --hitting the Joint Strike fighter a couple of years ago, comes as no surprise to many in the cyber world. The Obama administration is preparing to release a review of the nation's cyber security.
The Bulgarian government is moving to authorize widespread confiscation of illegally obtained assets. Their goal is to crackdown ion powerful organized crime and corruption.
Justice Minister Margarita Popova said the action would be a key weapon for the newly elected government, to fight crime and avoid punishment from the European Union.
Failure to demonstrate results by July next year could cut off Bulgaria's access to 11 billion Euros foreign. Bulgaria is also thought tO be a major hub of illegal cyber activity.