Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Cybersecurity
Web page addresses can be disguised or take you to an unexpected site. Many web browsers are configured to provide increased functionality at the cost of decreased security. New security vulnerabilities may have been discovered since the software was configured and packaged by the manufacturer. Computer systems and software packages may be bundled with additional software, which increases the number of vulnerabilities that may be attacked.
The U.S. government says there is an increasing threat from software attacks that take advantage of vulnerable web browsers. USCERT says we have observed a trend whereby new software vulnerabilities are exploited and directed at web browsers through use of compromised or malicious websites. This problem is made worse by a number of factors, including the fact that many users have a tendency to click on links without considering the risks of their actions.
In her farewall remarks Tuesday, DHS Secretary Janet Napolitano said security improvements have made the U.S. safer. She will leave her position Sept. 6.
The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private researchers express disillusionment with the National Security Agency. Experts say much of the goodwill that existed has been erased after the NSA's classified programs to monitor phone records and Internet activity were exposed by former NSA contractor Edward Snowden.
Your web browser. No matter which one you use, it's vulnerable. The U.S. Computer Emergency Readiness Team (USCERT) says it is vital to configure them securely. USCERT says often the operating system is not set up in a secure default configuration. Not securing your web browser can lead quickly to a variety of computer problems caused by anything from spyware being installed without your knowledge to intruders taking control of your computer.
The Defense chief information officer is expected to update one directive to expand the number and type of devices that must meet the military's cybersecurity requirements. The Pentagon also will issue a second revised directive to move DoD closer to civilian agencies around risk management of IT systems.
Eight cutting-edge technologies developed by the government are being shown off this week to venture capitalists and investors in Silicon Valley, with the hope of attracting someone to take the applications to market.
Phyllis Schneck is the new deputy undersecretary of cybersecurity in the National Protection and Programs Directorate at DHS. She replaces Mark Weatherford, who left in April.
Not only are Americans suspicious of NSA, but according to bizjournal.com Washington bureau, Foreign competitors are looking to aggressively grow their market share in cloud computing because of concerns raised by the National Security Agency's PRISM program. Bizjournals.com reports U.S. cloud computing companies could lose $22 billion to $35 billion in revenue over the next three years because of foreign customers' concerns about the privacy of their data.