bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
2:26 am, November 26, 2014

Search Result

Search Tags:  Cybersecurity

DHS sketching future of Einstein cyber tools

The National Cybersecurity Protection System is testing software and hardware from the Defense Department and industry to figure out how to expand the Einstein toolset. DHS reports that 13 of 19 major agencies already have installed Einstein 2. The department also is planning to hold an industry day for a classified cyber RFI.

Tags: technology , Nicole Dean , DHS , DoD , cybersecurity , Einstein , intrusion detection , intrusion protection , TIC , MTIPS , Jason Miller

Thursday - 09/09/2010, 07:20am EDT
Listen

Why humans can't be replaced for cybersecurity

Learn more in today's cybersecurity update

Tags: newscast , DorobekInsider , cybersecurity

Wednesday - 09/08/2010, 07:10pm EDT
Listen

Microsoft gets superweapon for fighting botnets

Spammers exploit second Facebook bug

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Microsoft , botnets , Facebook , Best Buy , Walmart

Wednesday - 09/08/2010, 08:30am EDT

Identity Aware Loss Prevention: How to Manage and Protect Sensitive Information

September 22nd at 11 AM

Data Loss Prevention (DLP) is receiving significant attention within the information security community as individuals and organizations realize the importance of managing and protecting sensitive information. The impact of a data breach can be significant, resulting in lost productivity, failed audits, and negative press exposure.

This session will review the benefits of identity-aware Data Loss Prevention and how these integrated solutions can help reduce IT risk, automate key security processes and enhance overall compliance posture.

Tags: technology , CA Technologies , Dynamic Cybersecurity , cybersecurity , Gijo Mathew , security , Peter Gouldmann , NIST , CNSS , Brian P. Burns , Pentagon , Airforce , Simon Szykman

Tuesday - 09/07/2010, 04:02pm EDT
Listen

DHS increases access to research

Also, is Defense cybersecurity spending asymmetrical?

Tags: Federal Drive , newscast , technology , cybersecurity , Cybersecurity Update , DHS

Tuesday - 09/07/2010, 08:30am EDT

NIST finalizes Smart Grid cyber guidelines

CBP lax in controlling cybersecurity

Tags: Federal Drive , Cybersecurity Update , cybersecurity , CBP , NIST , Smart Grid

Friday - 09/03/2010, 08:30am EDT

Is cybersecurity funding asymmetrical?

learn more in today's cybersecurity update

Tags: DorobekInsider , newscast , cybersecurity , Cybersecurity Update , technology , defense , funding , George Mason , Paul A. Strassmann

Thursday - 09/02/2010, 05:30pm EDT
Listen

Know your data so you can protect it

If you don't want employees in your agency to use a USB device, you can install an agent on the laptop that'll block any communication with a USB device. It is one example of a Data Leak Prevention tool, which can help you define the data you're trying to protect from threats within your own network. But that also means you have to know exactly what data it is that you WANT to protect. Khalid Kark of Forrester Research says if you don't know, you can't define it and the DLP tools can't work.

Tags: technology , Inside Cybersecurity , Khalid Kark , Forrester Research , cybersecurity , Amy Morris

Thursday - 09/02/2010, 04:03pm EDT

Network-centric tools help guard against internal threats

New tools can help you protect your network from the threat within. Khalid Kark of Forrester Research says there's a set of tools that are considered "network-centric," that will record all the network sessions. That allows cyber sleuths to replay the sessions and find out where any breaches or intrusions are coming from - in house. There are also "data leak prevention" tools you can use that'll allow you to create your own parameters that'll block that information from leaving your network.

Tags: technology , Inside Cybersecurity , cybersecurity , CA Technologies , Khalid Kark , Forrester Research , Amy Morris

Thursday - 09/02/2010, 03:57pm EDT

Is your agency under attack from within?

The cyber threat landscape has changed dramatically in recent years. Experts believe that more threats than ever are not coming from other countries, or malicious hackers - but from within the network!The U.S. National Counterintelligence Strategy says that insiders are targeting networks to intercept information, or disrupt operations. Khalid Kark of Forrester Research says agencies have to manage people, the process, and technological controls. Continuous monitoring is the new buzzword.

Tags: technology , Inside Cybersecurity , CA Technologies , cybersecurity , Amy Morris

Thursday - 09/02/2010, 03:52pm EDT
  •  
  • 215
  •