bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
10:13 am, October 22, 2014

Search Result

Search Tags:  Cybersecurity

Facebook fixing forgery bug

Cybersecurity bill leans on buying power, cyber warrior ranks swell

Tags: Federal Drive , Cybersecurity Security update , cybersecurity , Facebook , Joe Lieberman , contracting , technology , Air Force , digital warriors

Wednesday - 05/19/2010, 08:30am EDT

Booz Allen Hamilton gets new cyber contracts from DoD

Read more of the Danger Room blog post.

Tags: newscast , cybersecurity

Tuesday - 05/18/2010, 05:31pm EDT

White House wants your input on new cyber themes

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , DorobekInsider

Tuesday - 05/18/2010, 05:10pm EDT

Your wireless router could leave you vulnerable

If you use an embedded system of any kind, you could be leaving yourself open to cyber attacks. Learn how to protect yourself!

Tags: technology , management , cybersecurity , Cybersecurity Update , Paul Asadoorian , embedded system , PaulDotCom Enterprises , SANS , Dorothy Ramienski , DorobekInsider

Tuesday - 05/18/2010, 03:00pm EDT

Crime Friendly ISP Offline

P2P networks a treasure trove of leaked health care data, study finds; DHS contracts immixGroup to support C3

Tags: Cybersecurity Update , cybersecurity , contracting , Zeus botnet , eHealth , DHS , ImmixGroup , ICE , Cyber Crimes Center , C3

Tuesday - 05/18/2010, 08:30am EDT

DHS Info Sharing

Many say for the government to secure their own networks, it must work more closely with the private sector.

The Homeland Security Department, and other agencies, are now testing out just how that approach might work. That Department is in the middle of several pilot programs to improve how the government and industry share information related to cyber threats.

One goal is to make the sharing of classified information easier, such as an expansion of the post-9/11 Network Fusion Centers used in every state.

Tags: technology , Cybersecurity Report , cybersecurity , DHS , Scott Carr

Monday - 05/17/2010, 02:08pm EDT

Money Mules Targeted

Cyber criminals know how to steal online funds, but the criminals who know how to convert those funds into cash are now being targeted specifically by the FBI.

Agency officials say they're targeting - what they call - the "money mules" who receive the transfers of stolen funds into their bank accounts. They then make the transaction appear legitimate, sending the money to associates in other countries.

The FBI hopes to raise public awareness and dissuade people from becoming mules. The FBI hopes to raise public awareness and dissuade people from becoming mules.

Tags: technology , Cybersecurity Report , cybersecurity , FBI , Scott Carr

Monday - 05/17/2010, 02:08pm EDT

Opportunities grow for cyber contractors

A cutting-edge forum addresses public-private partnerships, R&D innovations, and contracting opportunities to protect our country's cyber infrastructure. CyberSecurity Seminars CEO Tom Billington has details.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , contracting , R&D , CyberSecurity Seminars , Tom Billington

Monday - 05/17/2010, 11:30am EDT
Listen

OMB seeks comments on FISMA metrics

GPS glitch hit some military systems in January.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , OMB , Air Force

Monday - 05/17/2010, 08:38am EDT

OMB wants agency input on FISMA

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , daily debrief

Friday - 05/14/2010, 03:42pm EDT
  •  
  • 237
  •