Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Cybersecurity
P2P networks a treasure trove of leaked health care data, study finds; DHS contracts immixGroup to support C3
Many say for the government to secure their own networks, it must work more closely with the private sector.
The Homeland Security Department, and other agencies, are now testing out just how that approach might work. That Department is in the middle of several pilot programs to improve how the government and industry share information related to cyber threats.
One goal is to make the sharing of classified information easier, such as an expansion of the post-9/11 Network Fusion Centers used in every state.
Cyber criminals know how to steal online funds, but the criminals who know how to convert those funds into cash are now being targeted specifically by the FBI.
Agency officials say they're targeting - what they call - the "money mules" who receive the transfers of stolen funds into their bank accounts. They then make the transaction appear legitimate, sending the money to associates in other countries.
The FBI hopes to raise public awareness and dissuade people from becoming mules. The FBI hopes to raise public awareness and dissuade people from becoming mules.
A cutting-edge forum addresses public-private partnerships, R&D innovations, and contracting opportunities to protect our country's cyber infrastructure. CyberSecurity Seminars CEO Tom Billington has details.
GPS glitch hit some military systems in January.
Learn more in today's cybersecurity update.
Facebook rolling out new security features, House panel to consider cybersecurity overhaul
The agency is working with different industry sectors to improve how and the kinds of IT security information that flows in both directions. DHS has a pilot with DoD and financial services companies to exchange threat and malicious activity from their networks. DHS also has installed Einstein 2 software on 12 agency networks to improve how they recognize risks.
Tags: technology , Greg Shaffer , Anna Eshoo , John Denning , DHS , DoD , GAO , Computer and Communications Industry Association , Financial Services Information Sharing and Analysi , cybersecurity , Einstein , information sharing , Jason Miller
The concept of doing "even more with even less" is a step beyond "doing more with less." Lisa Mascolo of Accenture has some ideas for doing it.
WFED's Jason Miller reports.