Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: McAfee
Typos have created the world's newest hotbed for cybercrime.
China has bumped the United States as the most feared nation in cyberspace.
Even in a year in which the Stuxnet attack targeted critical infrastructure systems and attacks on grid operators rose dramatically, operators of critical infrastructure around the world took few steps to increase their cyber defenses, a new report found.
Tags: technology , management , cybersecurity , critical infrastructure , Stuxnet , Center for Strategic and International Studies , DHS , White House , FERC , Michael Peters , Stewart Baker , Jared Serbu , Cybersecurity Update
Sentrigo's flagship product, Hedgehog Enterprise, monitors databases for illegal or unauthorized activity.
The merger allows McAfee to continue developing and selling security products and services under its own brand.
McAfee reports on its fourth quarter findings that threats to smart phones and other mobile devices are increasing.
Many consumers neglect to take the necessary steps required to protect themselves from the dangers of cybercrime associated with their new prized-possessions and tech gadgets. We get advice from McAfee's Dave Marcus.
February 1st at 12pm
Program will discuss the progress report on CyberSecurity in the Federal Government, top CyberSecurity Priorities, challenges to still overcome in IT Security, lessons learned, and vision for the future - how can we be proactive and prevent attacks.
Tags: technology , Federal Executive Forum , Trezza Media Group , Jim Flyzik , The Flyzik Group , Greg Schaffer , David Glenn , Lee Holcomb , Ed White , Tim Brown , cybersecurity , cyber , DHS , Lockheed Martin , DoJ , CA Technologies
SC Magazine reports that Macs and other Apple products will be targets of malware in 2011.
The U.S. will face persistant cyber attacks, McAfee predicts.