bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
1:18 am, November 23, 2014

Search Result

Search Tags:  Cybersecurity

Bill would give DHS emergency cyber powers

Bill would require Defense to explore new cybersecurity buys and tools, First governmentwide cyber provider approved

Tags: Federal Drive , Cybersecurity Update , cybersecurity , DHS , GSA , DoD , defense

Thursday - 06/03/2010, 08:30am EDT

GSA, DHS approve first governmentwide cyber provider

AT&T receives an authority to operate its cybersecurity services under the Networx telecommunications contract. Agencies now can purchase these services to meet the Trusted Internet Connections requirements.

Tags: technology , contracting , OMB , GSA , DHS , FTC , EPA , Treasury , AT&T , Qwest , Sprint , Verizon , Jeff Mohan , Tom McMahon , Bill White , Networx , telecommunications , cybersecurity , TIC , MTIPS , Jason Miller

Wednesday - 06/02/2010, 06:38pm EDT
Listen

NIST details continuous monitoring for your agency

Learn more about the updated FISMA guidance in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , DorobekInsider

Wednesday - 06/02/2010, 03:47pm EDT
Listen

FISMA one step closer to overhaul

House passes Defense Authorization Bill. Learn more in our cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , FISMA , DorobekInsider

Tuesday - 06/01/2010, 05:06pm EDT

Google goes ABW: Anything But Windows

Facebook 'hilarious video' malware notsofunny, IBM Distributes Malware At Security Conference

Tags: Cybersecurity Update , cybersecurity , Google , Windows , Facebook , IBM , malware , thumbdrive

Tuesday - 06/01/2010, 08:30am EDT

Don't Let Tab-Nappers Catch You Napping

Dubbed tab-napping, a new type of attack has been using Java script to secretly change the content of open, but idle, tabbed browser windows.

Even hours after opening them, users may see familiar-looking log-in windows for their online shopping or e-mail accounts. But, credential information used to log-on may actually be sent to hackers. Analysts caution, all of the major browsers for Windows 7 and Mac Operating Systems are potentially vulnerable.

Tags: technology , Cybersecurity Report , cybersecurity , Scott Carr

Monday - 05/31/2010, 07:55pm EDT

Scientist Infected with Computer Virus

A British scientist claims to be the first human to have been infected (so to speak) with a computer virus after he contaminated an electronic chip which was inserted into his hand. Dr Mark Gasson, of the University of Reading, says the device was programmed with a virus which could transfer itself to other electronic systems that it came in contact with, raising the possibility that in the future, advanced medical devices like pacemakers could become vulnerable to cyber attack.

Tags: technology , Cybersecurity Report , cybersecurity , Mark Gasson , University of Reading , Scott Carr

Monday - 05/31/2010, 07:52pm EDT

Feds, industry collaborate on cybersecurity

There's a government-industry partnership that's trying to make good on the need for collaboration in cybersecurity innovation.

Tags: technology , cybersecurity , Cybersecurity Update , ISC(2) , innovation , Max Cacas

Friday - 05/28/2010, 05:57pm EDT
Listen

Joint Chiefs: Cyber will change the way we fight

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , DorobekInsider

Friday - 05/28/2010, 05:38pm EDT

Dynamics of federal cybersecurity management changing

Former e-gov administrators Karen Evans and Mark Forman give their insight as to how federal cybersecurity management is changing now that President Obama's 60 Day Cyber Security Review is over a year old. Is FISMA a thing of the past? Find out by reading more.

Tags: technology , management , cybersecurity , FISMA , cloud computing , GISRA , Karen Evans , Mark Forman , Francis Rose , Dorothy Ramienski

Friday - 05/28/2010, 05:07pm EDT
Listen
  •  
  • 237
  •