bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
7:31 am, April 17, 2014

Search Result

Search Tags:  Cybersecurity

DHS might soon be in charge of civilian networks

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , DorobekInsider , DHS , Jason Miller

Thursday - 06/10/2010, 05:58pm EDT
Listen

Bill would put DHS in charge of all civilian networks

Sens. Lieberman, Collins and Carper's legislation creates two new offices to oversee federal cybersecurity in DHS and the White House. It also forms a new Federal Information Security Taskforce made up of agency chief information security officers. Bill does not include "kill switch" provision for private sector networks.

Tags: technology , Joseph Lieberman , Susan Collins , Tom Carper , OMB , White House , DHS , OPM , cybersecurity , Jason Miller

Thursday - 06/10/2010, 10:00am EDT
Listen

Security hole exposes iPad users' e-mails

Bill would put DHS in charge of all civilian networks

Tags: Federal Drive , Cybersecurity Update , cybersecurity , iPad , AT&T , DHS

Thursday - 06/10/2010, 08:30am EDT

Labor Department focuses on security aspects of cloud

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , Labor , cloud computing

Wednesday - 06/09/2010, 05:15pm EDT
Listen

HP to build cyber system for Air Force

After Google hack, warnings pop up in SEC filings

Tags: Federal Drive , Cybersecurity Update , cybersecurity , HP , Air Force , contracting , Google , Intel , Symantec , Northrop Grumman

Wednesday - 06/09/2010, 08:30am EDT

Continuous Monitoring? Been there, doing that

This week, Federal Security Spotlight talks with John Streufert of the State Department.
June 10, 2010

Tags: technology , Federal Security Spotlight , State , John Streufert , cybersecurity , Tom Temin

Tuesday - 06/08/2010, 06:03pm EDT
Listen

DHS's Marshall: Supply chain management vital

The challenge of securing the nation's IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.

Tags: In Depth , Francis Rose , technology , cybersecurity , DHS , Richard Marshall , National Cybersecurity Division , ISC2 , FBI , HP , Electronic Data Systems , Howard Schmidt , Barack Obama , Max Cacas

Tuesday - 06/08/2010, 07:09pm EDT
Listen

Analyst accused of leaking classified information

Bradley Manning was detained during a tour of duty in Iraq.

Tags: technology , cybersecurity , Cybersecurity Update , DorobekInsider

Tuesday - 06/08/2010, 05:08pm EDT

Congress doesn't see cybersecurity's sex appeal

Google denies use of private data, Adobe warns of critical security flaw in its products

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Adobe , Google , Street View

Tuesday - 06/08/2010, 08:30am EDT

What Will CYBERCOM'S Mission Be?

The U.S. Cyber Command - or CYBERCOM - officially became operational in late May. But observers inside the military and out still aren't sure what the command is supposed to do: protect the Pentagon's networks, strike out at enemies, seal up civilian vulnerabilities, or some combination of all three. CYBERCOM officials insist they have no interest in taking over the security of the Internet, but Pentagon officials have floated the idea the Defense Department might start a protective program for civilian networks.

Tags: technology , Cybersecurity Report , cybersecurity , U.S.Cyber Command , CYBERCOM , Pentagon , DoD , Scott Carr

Monday - 06/07/2010, 09:00pm EDT
  •  
  • 219
  •