bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
1:18 pm, December 18, 2014

Search Result

Search Tags:  Cybersecurity

Smart Grid ending before it starts?

Maryland recently denied Baltimore Gas and Electric Company authorization to deploy smart meters, arguing the potential financial and technological risks to consumers outweighed the benefits. Is this the beginning of the end for the Smart Grid? We ask Lisa Margonelli, director, Energy Policy Initiative at the New America Foundation.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Lisa Margonelli , Smart Grid , New America Foundation , Meg Beasley

Tuesday - 07/13/2010, 10:30am EDT
Listen

Cybersecurity guidance for parents

Microsoft to release patch that will strengthen data security

Tags: cybersecurity , Federal Drive , Microsoft , BBB , guidance

Monday - 07/12/2010, 08:30am EDT

DHS officially assumes its new cyber role

DHS gets official oversight over all civilian agency computer networks.

Tags: technology , cybersecurity , Cybersecurity Update , OMB , DHS , DoD , Bradley Manning , best practices

Friday - 07/09/2010, 05:16pm EDT
Listen

GSA Works to Boost Security in the Cloud

The General Services Administration is reiterating its promise to boost cybersecurity and privacy of cloud computing.

As part of the so-called FEDRAMP program, beginning this fall an interagency group will inspect vendors' cloud computing facilities to make sure they meet federal security standards. If the group certifies a cloud facility, agencies would be able to sign up for service without having to further inspect the facility.

Tags: technology , Cybersecurity Report , cybersecurity , GSA , FedRAMP , cloud , Scott Carr

Friday - 07/09/2010, 11:13am EDT

N. Korea Ruled Out In 2009 Cyberattacks

U.S. officials have largely ruled out North Korea as the origin of a computer attack last July that took down U.S. and South Korean government websites.

But, authorities aren't much closer than they were a year ago to knowing exactly who did it, or why.

Early analysis of the fast-moving "denial of service" attacks pointed to North Korea since code used included Korean language.

Experts say agencies are better prepared today, but that many government and business sites remain vulnerable to similar attacks.

Tags: technology , Cybersecurity Report , cybersecurity , North Korea , South Korea , Scott Carr

Friday - 07/09/2010, 10:47am EDT

Continuous Monitoring Becoming a Buzzword

The so-called "continuous monitoring" of systems is becoming a hot topic in government. That's because under federal guidelines, agencies must report how they protect their information systems, plus, agencies are now required to submit real-time data about the state of their networks.

Continuous monitoring doesn't mean systems have to be watched every minute. Even now, some agencies are able to monitor their systems through international networks at least once a day.

Tags: technology , Cybersecurity Report , cybersecurity , Scott Carr

Friday - 07/09/2010, 10:46am EDT

IT Managers Expect More Network-born Threats

A new study that finds 80-percent of I-T managers expect network-born threats to increase over the next year. Perhaps even more troubling, more than half of managers told netForensics their organization was not budgeting enough, or recruiting enough new talent, to counter any added cyber-threats. Almost 25-percent of respondents said they saw a decrease in staff size in the last year.

More than half of the managers polled did however say their organization was more secure now than it was a year ago.

Tags: technology , Cybersecurity Report , cybersecurity , IT , Scott Carr

Friday - 07/09/2010, 10:43am EDT

Cybersecurity Framework Created for Governments Worldwide

A software trade association has produced a first-of-its-kind cybersecurity framework to help guide governments' security efforts worldwide. Officials with the Business Software Alliance say it's needed to help countries put together policies that will thwart the many kinds kinds of cybersecurity threats that exist.

Working with the private sector and prosecuting cyber-criminals are key parts of the framework.

Tags: technology , Cybersecurity Report , cybersecurity , Business Software Alliance , business , Scott Carr

Friday - 07/09/2010, 10:43am EDT
  •  
  • 229
  •