Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Cyber Security Reports
Internet routing tables are becoming a bigger concern for federal cybersecurity experts, as in recent weeks the protocol for internet routers appears to have been hacked. Traffic from some leading U.S. businesses and government agencies has been re-routed through China. A chief technologist with Neustar says part of the problem is that the Border Gateway Protocol the routers use doesn't require contractual relationships between routers, leading to a structure based on unconfirmed agreements.
The Pacific Northwest National Lab, part of the Department of Energy, says the Pentagon's computers experience more than five thousand cyber-attacks a day. Now the lab is working on a unique new way to fight cyber-threats with what it calls 'digital ants' that can digitally scurry through a network, cleaning up threats before they occur. The so-called "ants" can follow a virtual "trail" to the source of problems and retrieve information.