bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
9:47 pm, July 29, 2014

Search Result

Search Tags:  Cybersecurity

Know your data so you can protect it

If you don't want employees in your agency to use a USB device, you can install an agent on the laptop that'll block any communication with a USB device. It is one example of a Data Leak Prevention tool, which can help you define the data you're trying to protect from threats within your own network. But that also means you have to know exactly what data it is that you WANT to protect. Khalid Kark of Forrester Research says if you don't know, you can't define it and the DLP tools can't work.

Tags: technology , Inside Cybersecurity , Khalid Kark , Forrester Research , cybersecurity , Amy Morris

Thursday - 09/02/2010, 04:03pm EDT

Network-centric tools help guard against internal threats

New tools can help you protect your network from the threat within. Khalid Kark of Forrester Research says there's a set of tools that are considered "network-centric," that will record all the network sessions. That allows cyber sleuths to replay the sessions and find out where any breaches or intrusions are coming from - in house. There are also "data leak prevention" tools you can use that'll allow you to create your own parameters that'll block that information from leaving your network.

Tags: technology , Inside Cybersecurity , cybersecurity , CA Technologies , Khalid Kark , Forrester Research , Amy Morris

Thursday - 09/02/2010, 03:57pm EDT

Is your agency under attack from within?

The cyber threat landscape has changed dramatically in recent years. Experts believe that more threats than ever are not coming from other countries, or malicious hackers - but from within the network!The U.S. National Counterintelligence Strategy says that insiders are targeting networks to intercept information, or disrupt operations. Khalid Kark of Forrester Research says agencies have to manage people, the process, and technological controls. Continuous monitoring is the new buzzword.

Tags: technology , Inside Cybersecurity , CA Technologies , cybersecurity , Amy Morris

Thursday - 09/02/2010, 03:52pm EDT

DARPA wants to stop inside cyberthreat before it starts

DARPA is one agency that recognizes cyber threats are just as likely to come from within the network. The agency has posted a solicitation on Fed Biz Ops looking for what they call novel approaches to insider threat detection. The Defense Advanced Research Agency is looking for a way to increase the accuracy, rate and speed of detection. The Cyber Insider Threat (CINDER) program will stop adversaries from operating within government and military networks before they can get access.

Tags: technology , Inside Cybersecurity , CA Technologies , CINDER , cybersecurity , DARPA , FBO , Amy Morris

Thursday - 09/02/2010, 03:50pm EDT

Where will future cyberpros come from?

In the last 18 months, Melissa Hathaway said, cybersecurity threats have gotten far more stealthy and there is an understanding that it's not just an Internet-based threat. It can come from a multi-media device internally or even a wi-fi device.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Melissa Hathaway , GAO , David Powner

Thursday - 09/02/2010, 08:30am EDT

Will your agency's cybersecurity mandate change?

Your agency's cybersecurity marching orders may be changing. Former cyber czar Melissa Hathaway joined In Depth with Francis Rose with the latest analysis of bills in Congress that could change the nation's cybersecurity mandate. She tells Federal News Radio that it's down to two bills and one could have an impact on the role of CIOs.

Tags: In Depth , technology , cybersecurity , Francis Rose , Congress , FISMA , Melissa Hathaway , Vyomika Jairam

Wednesday - 09/01/2010, 08:52pm EDT
Listen

New car so fancy it could get hacked

Learn more in today's cybersecurity update.

Tags: newscast , DorobekInsider , cybersecurity

Wednesday - 09/01/2010, 05:08pm EDT
Listen

Cybersecurity 'month of bugs' launched today

Algerian web pirates hack the wrong site

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Abysssec , TechAmerica

Wednesday - 09/01/2010, 08:30am EDT

X-Force: cyber attack trends are worrisome

Learn more about the results from the latest IBM X-Force report. We speak with IBM's vice president of security strategy, Kris Lovejoy.

Tags: Federal Drive , technology , cybersecurity , X-Force report , IBM , Kris Lovejoy , Vyomika Jairam

Tuesday - 08/31/2010, 02:27pm EDT
Listen

ManTech wins Agriculture cybersecurity contract

IBM's X-Force tracks cyber threats. We get an update on threats so far this year

Tags: Federal Drive , cybersecurity , Cybersecurity Update , ManTech , IBM , IBM X-Force

Tuesday - 08/31/2010, 08:30am EDT
  •  
  • 207
  •