bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
10:40 pm, September 22, 2014

Search Result

Search Tags:  Don Benack

DHS teams hunt for weaknesses in federal cyber networks

The Federal Network Security branch is performing Red and Blue teaming exercises to expose the soft spaces in agency networks and harden them. DHS has conducted five Red Teams and 28 Blue Team exercises in 2012. Federal CIOs and CISOs must request the Red Teams to analyze their networks. The agency receives a report on the biggest risks it faces.
July 26, 2012

Tags: technology , cybersecurity , DHS , Rob Karas , Red Team , Blue Team , Jason Miller , Ask the CIO

Thursday - 07/26/2012, 09:59pm EDT
Listen

DHS Blue Teams bear out agency compliance with cybersecurity rules

The agency turns to teams of experts to review how departments are meeting the Trusted Internet Connections (TIC) initiative. DHS plans to expand the use of Blue Teams to the implementation of continuous monitoring and two-factor authentication under Homeland Security Presidential Directive-12.

Tags: technology , DHS , cybersecurity , TIC , HSPD-12 , continuous monitoring , Blue Teaming , Jason Miller

Monday - 07/16/2012, 05:25am EDT
Listen

DHS teams hunt for weaknesses in federal cyber networks

The Federal Network Security branch is performing Red and Blue teaming exercises to expose the soft spaces in agency networks and harden them. DHS has conducted five Red Teams and 28 Blue Team exercises in 2012. Federal CIOs and CISOs must request the Red Teams to analyze their networks. The agency receives a report on the biggest risks it faces.

Tags: technology , cybersecurity , DHS , Rob Karas , Red Team , Blue Team , Jason Miller , Federal Drive , Cybersecurity Update

Wednesday - 07/11/2012, 05:16am EDT
Listen