bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
10:36 pm, October 31, 2014

Search Result

Search Tags:  Cybersecurity

Thumb drive designed for cybersecurity missions

Harris Corporation has introduced a highly customizable USB thumb drive that quickly extracts targeted data from computers. The BlackJack™ is designed for military, intelligence, and law enforcement cyber security missions, where speed, stealth and accuracy are paramount considerations.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Harris Corporation , security , industry , contracting

Friday - 10/01/2010, 11:30am EDT

Bill would expand DHS cyber authority

Congressman Jim Langevin (D-RI) has introduced the Strengthening Cybersecurity for Critical Infrastructure Act, which would allow the Administration to create a more robust set of regulations for the information systems that control our critical infrastructure.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Jim Langevin , DHS , Congress

Friday - 10/01/2010, 10:30am EDT

OPM survey shaping future cyber workforce

National Cybersecurity Awareness Month officially kicks off today. In coming weeks, federal officials are expected to launch a number of public programs to raise awareness of the importance of securing the nation's computer networks for both government and private industry. But some officials also are using it as an opportunity to ask, "Where will the cybersecurity workers of tomorrow come from?"

Tags: technology , pay and benefits , management , cybersecurity , NIST , OPM , Maureen Higgins , CyberWatch , Robert Spear , NSF , cybersecurity workforce , Cybersecurity Awareness Month , Max Cacas

Friday - 10/01/2010, 07:37am EDT
Listen

UVa to offer cybersecurity info sessions

Participants will also learn how to use the Internet safely and and prevent identity theft.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , University of Virginia , Cybersecurity Awareness Month

Thursday - 09/30/2010, 09:30am EDT

Collaboration is the real test for Cyber Storm III

A U.S.-led, global exercise in cybersecurity preparedness and response is expected to wrap up in the next 24 hours. The scenario is helping seven agencies, 11 states, 12 nations and 60 private sector companies prepare for major cyber attack.

Tags: management , technology , cybersecurity , Cyber Storm III , DHS , Phil Reitinger , Brett Lambo , NCCIC , Max Cacas

Thursday - 09/30/2010, 07:28am EDT
Listen

GSA puts cyber focus on control systems

A draft policy obtained by Federal News Radio details new cybersecurity requirements for more than 1,500 buildings owned by GSA's Public Building Service. GSA wants to standardize how facility control systems connect to GSA's network. The document builds on work already being done under HSPD-12.

Tags: technology , GSA , PBS , Rob Zivney , Hirsch Electronics , smart buildings , cybersecurity , HSPD-12 , open standards , Critical infrastructure protection , Jason Miller

Thursday - 09/30/2010, 07:12am EDT
Listen

GSA proposes new cyber standards at its buildings

The General Services Administration is drafting new rules for improving cybersecurity. Federal News Radio's Jason Miller joined DorobekINSIDER with details and reaction to the policy.

Tags: Jason Miller , cybersecurity , GSA , Dorobek Insider , technology

Wednesday - 09/29/2010, 05:43pm EDT
Listen

Federal Cyber Preparedness

Prepare for the worst…and hope for the best. This unofficial mantra of the emergency preparedness and response community also applies to cyber preparedness. This week seven federal agencies, 11 states, 12 international partners, and 60 private sector companies are doing just that: preparing for the worst in cyberspace. These organizations are all participants in Cyber Storm III, a global cybersecurity preparedness exercise led by the U.S. Department of Homeland Security. By the end of the week, these organizations will have responded to a fictionalized cyber threat scenario designed to test their individual and collective capabilities to respond to cyber attacks and the National Cyber Incident Response Plan (Interim Version, September 2010). Federal cyber preparedness has never been more important. The threat to federal information assets and networks is diverse, persistent, and growing. In recent testimony before the U.S. House of Representatives, General Keith Alexander, Commander of the U.S. Cyber Command, stated that U.S. Department of Defense networks are "probed roughly 250,000 times an hour" and characterized the "…shift toward operationalizing cyber tools as weapons to damage or destroy" as a "great concern to us at Cyber Command." The National Cyber Incident Response Plan states:

    Preparedness activities, including establishing common situational awareness in a common operational picture, are shared responsibilities across Federal, State, Local, Tribal, and Territorial governments and the private sector.
This week's Cyber Storm III exercise will provide new insight into our federal agencies' cyber preparedness. As agencies identify lessons learned from the exercise and begin to make improvements to address areas of weakness, they should do so through a framework addressing the following elements:
  • Governance: bringing together the mission, policies, architectures, and organizational alignment to establish the who and what for risk management strategies.
  • Risk management: establishing risk tolerance thresholds and implementing the technologies and processes that will assess, prioritize, and monitor risk on a continual basis.
  • Compliance: ensuring the organization maintains a cyber security posture compliant with federal laws, regulations, guidelines, and standards with the ability to demonstrate sound risk management strategies when scrutinized by internal and external auditors and Inspectors General.
  • Operations: designing, implementing, and monitoring security controls at the operational and tactical levels to include the ability to adequately respond to, withstand, and remediate cyber attacks.
General Alexander described the new approach needed for cyber deterrence by paraphrasing General Sun Tzu's The Art of War: "we must understand the cyber environment and, the capabilities of our adversaries, and our own abilities."

By evaluating federal cybersecurity programs through this framework, agencies can better understand their capabilities and live up to their shared responsibility for cyber preparedness.

Tags: technology , KCG's Trusted Advisor Center , Cyber Storm III , cyber , cybersecurity , National Cyber Incident Response Plan

Wednesday - 09/29/2010, 03:26pm EDT

Patch rushed to cover ASP.net flaw

Microsoft has issued an out-of-band security update, blocking ongoing attacks against a flaw in the ASP.NET web application framework that can cause poor encryption implementations.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Microsoft , asp.net

Wednesday - 09/29/2010, 09:30am EDT

More spam on Twitter, Facebook

Twitter and Facebook users beware: Spam is on the rise. Hackers and spammers are looking for security holes in the social networking sites, USA Today reports.

Tags: Cybersecurity Update , Dorobek Insider , Twitter , Facebook , USA Today , cybersecurity , technology , hackers

Tuesday - 09/28/2010, 04:56pm EDT
  •  
  • 207
  •