bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
1:11 am, August 20, 2014

Search Result

Search Tags:  Cybersecurity

DHS alum Purdy looks at cyber scene

Andy Purdy, former cyber security advisor in the White House and a man instrumental to setting up the Homeland Security Department's National Cyber Security Division, is our guest on this week's Federal Security Spotlight.
June 24, 2010

Tags: technology , Federal Security Spotlight , Andy Purdy , CSC , cybersecurity , Tom Temin

Wednesday - 06/23/2010, 04:03pm EDT
Listen

White House to give identity management a push

Cyber coordinator Schmidt says the administration will issue a draft national strategy for secure online transactions by Friday. The goal is to make identity management easy to use, secure and interoperable to conduct business with the government and the private sector. Schmidt says transactions are key to everything the White House wants to do.

Tags: technology , Howard Schmidt , Ely Kahn , White House , GSA , DoD , Symantec , cybersecurity , secure online transactions , HSPD-12 , identity management , Jason Miller

Wednesday - 06/23/2010, 06:38am EDT
Listen

Why security needs to catch up to Web 2.0 technology

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , Tom Gillis , Web 2.0

Tuesday - 06/22/2010, 05:11pm EDT

Government devotes more brainpower, money to cyber

Cybersecurity is fast becoming Washington's growth industry of choice.

Tags: newscast , DorobekInsider , Must Reads , cybersecurity

Tuesday - 06/22/2010, 03:09pm EDT

Cybersymposium features security rock stars

Internet registrars accused of supporting online criminals, Australia considers cyberczar

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Symantec

Tuesday - 06/22/2010, 08:30am EDT

Hacking the hackers could solve cybersecurity woes

But is it legal? Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , hacking , DorobekInsider

Monday - 06/21/2010, 04:17pm EDT

Mobile devices can leave you open to cyber attacks

Increasingly, all sorts of devices will be Internet-enabled, and they will be looking to connect and communicate -- and this could be a bit of a problem if they're not secure.

Tags: technology , cybersecurity , Mocana Corp. , Gregory McNulty , Dorothy Ramienski , mobile devices , DorobekInsider

Monday - 06/21/2010, 03:48pm EDT
Listen

Security software often misses new malware

Cybersolution uses real-time intel feeds, Zeus is back with terrorism-themed spam

Tags: Federal Drive , Cybersecurity Update , cybersecurity , malware , NSS Labs , Fidelis Security , Cyveillance , Zeus botnet

Monday - 06/21/2010, 08:30am EDT
  •  
  • 224
  •