Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Cybersecurity Update
Some ex-employees turn to cybercrime
Learn all about it in today's cybersecurity update.
DHS selects Waterfall to support CSSP, Symantec finds pet names used frequently as passwords
Charles Croom, Vice President of Cyber Security Solutions at Lockheed Martin, takes seat on non-profit NCSA's board of directors.
A new partership between the FAA and IBM is designed to keep the Federal Aviation Administration safe from cyberattacks. The agency and the company are working together on a new approach that uses streaming analytics to watch for abnormal activity in the system. IBM U.S. Federal CTO Dave McQueeney tells Federal News Radio that the new approach is different from the current technique of taking a sample of data as it comes into the system -- possibly slowing response time. McQueeney says the new system will learn the patterns of normal behavior and then learn patterns of suspicious behavior.
Learn more in today's cybersecurity update.
Expert says the federal government has a lot of clout that it's not using. In its buying power, it needs to insist on safer software when they buy it ... things can move in the right direction.
"Apple's iPad announcement has set off a new round of reports of networks unburdened by a data flow they were not built to handle," Phil Bellaria, director of scenario planning for broadband, and John Leibovitz, deputy chief of the FCC's wireless telecom bureau, wrote in a Monday blog post.
DHS announced Jan. 4 in FedBizOpps.gov its intention to hire the National Cyber Security Alliance (NCSA) to help it promote and empower citizens to protect and secure the Internet and cyber infrastructure.