Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Cyber Security Reports
Internet routing tables are becoming a bigger concern for federal cybersecurity experts, as in recent weeks the protocol for internet routers appears to have been hacked. Traffic from some leading U.S. businesses and government agencies has been re-routed through China. A chief technologist with Neustar says part of the problem is that the Border Gateway Protocol the routers use doesn't require contractual relationships between routers, leading to a structure based on unconfirmed agreements.
The Pacific Northwest National Lab, part of the Department of Energy, says the Pentagon's computers experience more than five thousand cyber-attacks a day. Now the lab is working on a unique new way to fight cyber-threats with what it calls 'digital ants' that can digitally scurry through a network, cleaning up threats before they occur. The so-called "ants" can follow a virtual "trail" to the source of problems and retrieve information.