Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: Cybersecurity
Bill would require Defense to explore new cybersecurity buys and tools, First governmentwide cyber provider approved
AT&T receives an authority to operate its cybersecurity services under the Networx telecommunications contract. Agencies now can purchase these services to meet the Trusted Internet Connections requirements.
Tags: technology , contracting , OMB , GSA , DHS , FTC , EPA , Treasury , AT&T , Qwest , Sprint , Verizon , Jeff Mohan , Tom McMahon , Bill White , Networx , telecommunications , cybersecurity , TIC , MTIPS , Jason Miller
Learn more about the updated FISMA guidance in today's cybersecurity update.
House passes Defense Authorization Bill. Learn more in our cybersecurity update.
Facebook 'hilarious video' malware notsofunny, IBM Distributes Malware At Security Conference
Dubbed tab-napping, a new type of attack has been using Java script to secretly change the content of open, but idle, tabbed browser windows.
Even hours after opening them, users may see familiar-looking log-in windows for their online shopping or e-mail accounts. But, credential information used to log-on may actually be sent to hackers. Analysts caution, all of the major browsers for Windows 7 and Mac Operating Systems are potentially vulnerable.
A British scientist claims to be the first human to have been infected (so to speak) with a computer virus after he contaminated an electronic chip which was inserted into his hand. Dr Mark Gasson, of the University of Reading, says the device was programmed with a virus which could transfer itself to other electronic systems that it came in contact with, raising the possibility that in the future, advanced medical devices like pacemakers could become vulnerable to cyber attack.
There's a government-industry partnership that's trying to make good on the need for collaboration in cybersecurity innovation.
Learn more in today's cybersecurity update.
Former e-gov administrators Karen Evans and Mark Forman give their insight as to how federal cybersecurity management is changing now that President Obama's 60 Day Cyber Security Review is over a year old. Is FISMA a thing of the past? Find out by reading more.