bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
2:14 pm, November 23, 2014

Search Result

Search Tags:  Cybersecurity

Money Mules Targeted

Cyber criminals know how to steal online funds, but the criminals who know how to convert those funds into cash are now being targeted specifically by the FBI.

Agency officials say they're targeting - what they call - the "money mules" who receive the transfers of stolen funds into their bank accounts. They then make the transaction appear legitimate, sending the money to associates in other countries.

The FBI hopes to raise public awareness and dissuade people from becoming mules. The FBI hopes to raise public awareness and dissuade people from becoming mules.

Tags: technology , Cybersecurity Report , cybersecurity , FBI , Scott Carr

Monday - 05/17/2010, 02:08pm EDT

Opportunities grow for cyber contractors

A cutting-edge forum addresses public-private partnerships, R&D innovations, and contracting opportunities to protect our country's cyber infrastructure. CyberSecurity Seminars CEO Tom Billington has details.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , contracting , R&D , CyberSecurity Seminars , Tom Billington

Monday - 05/17/2010, 11:30am EDT
Listen

OMB seeks comments on FISMA metrics

GPS glitch hit some military systems in January.

Tags: Federal Drive , Cybersecurity Update , cybersecurity , OMB , Air Force

Monday - 05/17/2010, 08:38am EDT

OMB wants agency input on FISMA

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , daily debrief

Friday - 05/14/2010, 03:42pm EDT

Laptop stolen from VA contractor

Facebook rolling out new security features, House panel to consider cybersecurity overhaul

Tags: Cybersecurity Update , cybersecurity , Facebook , VA , stolen laptop , White House

Friday - 05/14/2010, 08:30am EDT

DHS tries sharing cyber threat data differently

The agency is working with different industry sectors to improve how and the kinds of IT security information that flows in both directions. DHS has a pilot with DoD and financial services companies to exchange threat and malicious activity from their networks. DHS also has installed Einstein 2 software on 12 agency networks to improve how they recognize risks.

Tags: technology , Greg Shaffer , Anna Eshoo , John Denning , DHS , DoD , GAO , Computer and Communications Industry Association , Financial Services Information Sharing and Analysi , cybersecurity , Einstein , information sharing , Jason Miller

Friday - 05/14/2010, 06:58am EDT
Listen

Industry Chatter: Lisa Mascolo of Accenture

The concept of doing "even more with even less" is a step beyond "doing more with less." Lisa Mascolo of Accenture has some ideas for doing it.

Tags: In Depth , Industry Chatter , management , technology , best practices , cybersecurity , Lisa Mascolo , Accenture , contracting

Thursday - 05/13/2010, 07:33pm EDT
Listen

DHS pilot programs look at cyber info sharing

WFED's Jason Miller reports.

Tags: technology , DHS , cybersecurity , Jason Miller

Thursday - 05/13/2010, 04:47pm EDT
Listen

FBI investigates cyber 'money mules'

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update , FBI

Thursday - 05/13/2010, 04:45pm EDT

How to fight through a digital meltdown

How would the military carry on in the event that an enemy manages to meltdown the DoD's digital information infrastructure? We get thoughts from Air Force Major General Kevin Kennedy, Director for Joint Capability Development (J8), U.S. Joint Forces Command.

Tags: Federal Drive , cybersecurity , DoD , Kevin Kennedy , Air Force , AFCEA , security , Suzanne Kubota

Thursday - 05/13/2010, 09:56am EDT
Listen
  •  
  • 241
  •