bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
4:48 am, October 25, 2014

Search Result

Search Tags:  Cybersecurity

DISA's Stempfley heading to DHS's cybersecurity division

DHS also will make Randy Vickers the permanent head of U.S. CERT. Stempfley would become the first permanent NCSD director since 2007. The division's oversight of federal civilian networks is growing more important with Einstein and TIC initiative.

Tags: technology , Bobbi Stempfley , Cornelius Tate , Peter Fonash , Randy Vickers , DISA , DHS , U.S. CERT , Mischel Kwon , RSA , cybersecurity

Friday - 04/09/2010, 03:03pm EDT

'TigerText' app seen as national security threat

Microsoft slates 25-patch Windows update for next week, many PCs still vulnerable to Conficker worm, Chinese ISP momentarily hijacks the Internet

Tags: Cybersecurity Update , cybersecurity , Tiger Woods , iPhone application , Windows , Conficker , China

Friday - 04/09/2010, 08:30am EDT

Former FBI CIO Zal Azmi forsees better cyber days ahead

CACI International VP believes agencies are making progress on security

Tags: management , cybersecurity , Zal Azmi , FBI , CACI

Thursday - 04/08/2010, 08:55pm EDT
Listen

GAO applauds DHS critical infrastructure protection plan

Some ex-employees turn to cybercrime

Tags: Cybersecurity Update , cybersecurity , GAO , DHS , critical infrastructure , cybercrime , Verizon

Thursday - 04/08/2010, 08:30am EDT

Industry Chatter: Lumension's Pat Clawson

Company's Chairman and CEO warns that intellectual property loss could be one of biggest consequences of cyber shortcomings.

Tags: Industry Chatter , technology , Pat Clawson , Lumension , cybersecurity

Wednesday - 04/07/2010, 08:01pm EDT
Listen

More federal cybersecurity fighters needed

Learn all about it in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update

Wednesday - 04/07/2010, 04:20pm EDT

Federal Cyber Security Education and Training

Cyber attacks are a growing vulnerability for our homeland security and broader national interests - and federal employees are on the front lines. In fact, Politico recently reported that Congress and other government agencies face an average of 1.8 billion cyber attacks per month. Both the number of attacks and their sophistication continue to increase at an alarming rate.

In many instances, the key to successfully combating an attack is stopping it at its entry point, which is often the unsuspecting federal employee. For example, the Politico report pointed out that "…attacks are increasingly focused on infiltrating application software on Hill staffer computers…,"noting:

    In the last five months of 2009, 87 Senate offices, 13 Senate committees and seven other offices were attacked by spear-phishing attacks, which appeared as e-mail messages to staffers urging them to open infected attachments or click on bad links.
It is critical that federal employees understand the possible types of cyber attacks in order to guard against them. Creating an awareness of cyber threats is only the beginning. Addressing a persistent and evolving threat requires persistent and evolving training. A number of key elements are required for any near-term or long-term cyber security training effort to succeed.
  • Cyber security must be an agency priority. Cyber security education and training are much like any other agency initiative: if leadership indicates that something is a priority, agency employees will take action. Agency leadership must make it clear that cyber security education and training are a priority, model the behavior they ask of their employees, and dedicate resources to address the problem and its solution. If they do so, federal employees will respond accordingly.
  • Education and training must be continuous. Hackers, terrorists, and other bad cyber actors do not wait for reporting requirements or other compelling organizational issues to decide when to attack - they just do. Education and training efforts should be ongoing, consistently updated, and test employees' understanding of the topic on a regular basis. Agencies must be as persistent and agile in their training as cyber attackers are in their efforts to do harm.
  • All agency employees must be included in training. All agency employees, and their contractors, are vulnerable to cyber attacks. No grade level is too high or too entry-level to be excluded from standard education and training.
  • Reporting and accountability measures must be implemented. Accountability mechanisms should be used to not only identify those personnel who have or have not received cyber security training, but also on how well they retain the information they have learned. The use of cyber security quizzes or other mechanisms to test the workforce's cyber knowledge provide a quantitative measure of the effectiveness of the training program as well as targeting specific personnel or subjects for deeper training.


  • The techniques used to attack information networks and exploit information are quickly evolving to the point where it is almost impossible to distinguish intrusion activity. The federal government must use an educated workforce on the cyber threat as a force multiplier as part of its cyber security strategy. Individual employees and agencies must share the responsibility for anticipating and preventing cyber attacks from succeeding.

    Tags: technology , Trusted Advisor Blog , cybersecurity , cyber , Congress , Senate , Politico

    Friday - 03/19/2010, 05:28pm EDT

Schmidt: U.S. can fight cyberwar

Learn more in today's cybersecurity update.

Tags: technology , cybersecurity , Cybersecurity Update

Monday - 03/08/2010, 04:05pm EST

Fatal System Error: design flaws put federal systems at risk

Expert says the federal government has a lot of clout that it's not using. In its buying power, it needs to insist on safer software when they buy it ... things can move in the right direction.

Tags: Cybersecurity Update , cybersecurity , Financial Times , Fatal System Error: The Hunt for the New Crime Lor , Joseph Menn

Friday - 03/05/2010, 09:36am EST
Listen
  •  
  • 246
  •