bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
1:03 pm, September 22, 2014

Search Result

Search Tags:  Cybersecurity

House Cybersecurity Caucus creates awareness website

Learn more in today's cybersecurity update.

Tags: telework , cybersecurity , Cybersecurity Update , House Cybersecurity Caucus

Wednesday - 08/04/2010, 04:36pm EDT
Listen

Federal cyber roles debated

New threat: Hackers look to take over power plants

Tags: Federal Drive , Cybersecurity Update , cybersecurity , DHS , critical infrastructure

Wednesday - 08/04/2010, 08:30am EDT

Public-private partnership catches creator of botnet

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , Rodney Joffe , Neustar , Mariposa botnet , DorobekInsider

Tuesday - 08/03/2010, 04:51pm EDT
Listen

New Energy report outlines cybersecurity weaknesses

The vulnerabilities of critical energy infrastructure installations to potential cyber attack are normally treated as restricted information and are exempt from public disclosure.

Tags: newscast , DorobekInsider , Must Reads , cybersecurity

Tuesday - 08/03/2010, 01:29pm EDT

Viruses found embedded in smartphone apps

DOE raises concern over safety of electric grid

Tags: Federal Drive , Google , smartphones , DoE , cybersecurity , Cybersecurity Update

Tuesday - 08/03/2010, 08:30am EDT

Is Trust the next "Killer App"?

August 12th, 2010 at 11 AM

How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next "Killer App"?

Tags: technology , Expert Voices presented by Booz Allen , Booz Allen , Expert Voices , Citi , Citibank , NSTIC , trust , trusted services , trust framework , securing identity , identity management , cybersecurity , cyber , cyberspace , Michael Farber , IT , John Clippinger , Berkman Center for Internet & Society , Dr. Jeff Voas , NIST , Hilary Ward , Global Transaction Services

Monday - 08/02/2010, 03:06pm EDT
Listen

Architecting Defense-in-Detail

August 11th at 11:05am

The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled' position to one that is now ‘network dependent.' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries.

The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.

Tags: technology , CA Technologies , Dynamic Cybersecurity , cybersecurity , Tim Brown , security , Robert Brese , DoE , Gary Galloway , State

Monday - 08/02/2010, 12:34pm EDT
Listen

CyberSecurity-"Progress & Best Practices"

August 10th at 12PM

Program will discuss the progress report on CyberSecurity in the federal government,top cybersecurity priorities, key challenges to still overcome in IT Security, lessons learned, and a vision for the future - how can we be proactive and prevent attacks?

Tags: technology , Federal Executive Forum , cybersecurity , Greg Schaffer , DHS , Rob Carey , Navy , Pat Howard , Joseph MOorcones , SafeNet , Sam Chun , HP , Ed White , McAfee , Jim Flyzik , Trezza , Flyzik Group

Monday - 08/02/2010, 10:42am EDT

Government contractor monitors U.S. internet providers

Microsoft Quashed Effort to Boost Online Privacy, Hacker builds $1,500 cell-phone tapping device

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Project Vigilant , Microsoft , Defcon

Monday - 08/02/2010, 08:30am EDT

Feds seek right role for protecting .com domain

With so much at stake, what role, if any does the federal government play in protecting the .com Internet domain? Several experts offer some candid observations on what the government's role should be.

Tags: technology , cybersecurity , Commerce , NIST , Patrick Gallagher , cisco , Don Proctor , RSA , Mischel Kwon , CSIS , James Lewis , Max Cacas

Monday - 08/02/2010, 06:30am EDT
Listen
  •  
  • 216
  •