bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
10:17 pm, November 21, 2014

Search Result

Search Tags:  Cybersecurity

Security hole exposes iPad users' e-mails

Bill would put DHS in charge of all civilian networks

Tags: Federal Drive , Cybersecurity Update , cybersecurity , iPad , AT&T , DHS

Thursday - 06/10/2010, 08:30am EDT

Labor Department focuses on security aspects of cloud

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , Labor , cloud computing

Wednesday - 06/09/2010, 05:15pm EDT
Listen

HP to build cyber system for Air Force

After Google hack, warnings pop up in SEC filings

Tags: Federal Drive , Cybersecurity Update , cybersecurity , HP , Air Force , contracting , Google , Intel , Symantec , Northrop Grumman

Wednesday - 06/09/2010, 08:30am EDT

Continuous Monitoring? Been there, doing that

This week, Federal Security Spotlight talks with John Streufert of the State Department.
June 10, 2010

Tags: technology , Federal Security Spotlight , State , John Streufert , cybersecurity , Tom Temin

Tuesday - 06/08/2010, 06:03pm EDT
Listen

DHS's Marshall: Supply chain management vital

The challenge of securing the nation's IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.

Tags: In Depth , Francis Rose , technology , cybersecurity , DHS , Richard Marshall , National Cybersecurity Division , ISC2 , FBI , HP , Electronic Data Systems , Howard Schmidt , Barack Obama , Max Cacas

Tuesday - 06/08/2010, 07:09pm EDT
Listen

Analyst accused of leaking classified information

Bradley Manning was detained during a tour of duty in Iraq.

Tags: technology , cybersecurity , Cybersecurity Update , DorobekInsider

Tuesday - 06/08/2010, 05:08pm EDT

Congress doesn't see cybersecurity's sex appeal

Google denies use of private data, Adobe warns of critical security flaw in its products

Tags: Federal Drive , Cybersecurity Update , cybersecurity , Adobe , Google , Street View

Tuesday - 06/08/2010, 08:30am EDT

What Will CYBERCOM'S Mission Be?

The U.S. Cyber Command - or CYBERCOM - officially became operational in late May. But observers inside the military and out still aren't sure what the command is supposed to do: protect the Pentagon's networks, strike out at enemies, seal up civilian vulnerabilities, or some combination of all three. CYBERCOM officials insist they have no interest in taking over the security of the Internet, but Pentagon officials have floated the idea the Defense Department might start a protective program for civilian networks.

Tags: technology , Cybersecurity Report , cybersecurity , U.S.Cyber Command , CYBERCOM , Pentagon , DoD , Scott Carr

Monday - 06/07/2010, 09:00pm EDT

CERT Releases New Fuzz Tester

Carnegie Mellon University's Computer Emergency Response Team (or CERT) has released a new fuzzing framework that will help identify and eliminate security vulnerabilities from different kinds of software. The fuzz testers are used by security researchers to find vulnerabilities by sending random input to an application. Fuzz testing has been popular among hackers, but with the release of this framework, CERT can push businesses to subject all software to fuzz testing.

Tags: technology , Cybersecurity Reports , cybersecurity , CERT , Scott Carr

Monday - 06/07/2010, 08:58pm EDT

Network convergence could leave your phone vulnerable

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , DorobekInsider

Monday - 06/07/2010, 04:20pm EDT
Listen
  •  
  • 235
  •