Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Cybersecurity
This week, host Tom Temin talks about 'secure by design and construction' with Andrew Myers, associate professor of computer science at Cornell University.
May 20, 2010
Cybersecurity bill leans on buying power, cyber warrior ranks swell
Read more of the Danger Room blog post.
Learn more in today's cybersecurity update.
If you use an embedded system of any kind, you could be leaving yourself open to cyber attacks. Learn how to protect yourself!
P2P networks a treasure trove of leaked health care data, study finds; DHS contracts immixGroup to support C3
Many say for the government to secure their own networks, it must work more closely with the private sector.
The Homeland Security Department, and other agencies, are now testing out just how that approach might work. That Department is in the middle of several pilot programs to improve how the government and industry share information related to cyber threats.
One goal is to make the sharing of classified information easier, such as an expansion of the post-9/11 Network Fusion Centers used in every state.
Cyber criminals know how to steal online funds, but the criminals who know how to convert those funds into cash are now being targeted specifically by the FBI.
Agency officials say they're targeting - what they call - the "money mules" who receive the transfers of stolen funds into their bank accounts. They then make the transaction appear legitimate, sending the money to associates in other countries.
The FBI hopes to raise public awareness and dissuade people from becoming mules. The FBI hopes to raise public awareness and dissuade people from becoming mules.
A cutting-edge forum addresses public-private partnerships, R&D innovations, and contracting opportunities to protect our country's cyber infrastructure. CyberSecurity Seminars CEO Tom Billington has details.
GPS glitch hit some military systems in January.