Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: Cyber Security Report
PwC has released a new survey that indicates, cybercrime is the second most common type of fraud reported by financial firms, more than double the level across other industries. According to the report, 39 percent of financial services companies that suffered from economic crime last year said they had been hit by cybercrime, compared to 17 percent in other industries.
There's some new spyware that's been infecting hundreds of government computers in Europe and the United States. Several security researchers and Western intelligence officers, according to Reuters believe the malware, called Turla, is from the Russian government. They also think it's inked to the same software used in a U.S. military breach in 2008.
Earlier this year information security firm Mandiant identified a previously unknown group hackers thought to be in China. "People referred to China or Chinese hackers, but there was plenty of wiggle room there to assume it could be a collection of guys working in someone's basement without a tie to the government," Richard Behtlich chief security officer for Mandiant. The group the identified is called Unit 61398. Bejtlich says, "we showed pretty conclusively that at least this one group is part of the PLA" AKA The Chinese People's Liberation Army.
Law enforcement and first responders have been put on notice --their mobile phones are targets for hackers. They've been informed in roll call bulletins that hackers, by compromising mobile technology and exploiting vulnerabilities in portable operating systems, application software, and hardware. Compromise of a mobile device can have an impact beyond the device itself; malware can propagate across interconnected networks.
The Treasury Department has taken off-line four public websites for the Bureau of Engraving and Printing after a malicious code was found on a parent site. Visitors to the web domains, which provide information about U.S. currency, were redirected to a Ukrainian website that launched a variety of web-based attacks. Treasury officials say the Bureau began using a third-party cloud service provider to host the sites last year. That company suffered an intrusion, resulting in a number of Treasury Web sites being affected.
It's competition time for the armed forces universities. The National Security Agency and the Central Security Service are testing the five U.S. service academies during the 10th annual Cyber Defense Exercise. Teams will be tested on their ability to defend computer networks the students designed themselves. The winner will take home the coveted CDX trophy. The competition will take place at Lockheed Martin in Greenbelt, Maryland.
Major changes are coming to the way federal agencies deal with cyber- security. In issuing new guidance over FISMA (The Federal Information Security Management Act), the Office of Management and Budget wants to find out the cybersecurity status of all civilian agency networks. One requirement is that agencies submit real-time data about the state of their networks. The second; a government-wide benchmarking study on the state of cybersecurity. The third; a series of interviews between OMB and agencies to tailor cybersecurity programs to each agencies needs.