8:08 am, May 23, 2015

Search Result

Search Tags:  Stuxnet

Timeline: Cybersecurity Milestones, 2006-2012

A look at the events shaping cybersecurity policy in the federal government over the past six years.

Tags: cybersecurity , technology , timeline , Cybersecurity Rising , DoD , OMB , U.S. Cyber Command , U.S. Cyber Challenge , FISMA , Common Access Card , continuous monitoring , Howard Schmidt ,

Wednesday - 10/24/2012, 12:28pm EDT

Cyber lab turns to cryptology experts for help

The mysterious Gauss cyber-surveillance malware has experts stumped. Kaspersky Lab, a Moscow-based security vendor, has been dissecting Gauss.

Tags: cybersecurity , Cybersecurity Update , technology , Gauss , Kaspersky Lab ,

Wednesday - 08/15/2012, 08:51am EDT

Stopping Advanced Persistent Threats (APTs)

T.K. Keaninni, chief technology officer for nCircle joins host John Gilroy to talk about how his company can help your agency with its network security issues.
June 26, 2012

Tags: technology , cyber attacks , cyber security , Flame , advanced persistent threats , nCircle , network security , TK Keaninni , NIST , security content automation protocol , CISSP , John Gilroy , Federal Tech Talk

Tuesday - 06/26/2012, 11:08pm EDT

House intel chairman suggests U.S., Israel not behind cyber attacks on Iran

House Intelligence Committee Chairman Mike Rogers said he'd be "very careful" about assigning blame for the attacks on Iran's nuclear program. Half of what's been reported in the media on the matter is untrue, he said.

Tags: Mike Rogers , cybersecurity , technology , Bloomberg , Center for Security Policy , Flame , Congress , House Intelligence Committee , cyber attack

Friday - 06/22/2012, 05:32am EDT

In Depth interviews - June 19

On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources. Across-the-board mandatory cuts have a lot of people on edge, especially those who work closely with the Defense Department. Across-the-board mandatory cuts have a lot of people on edge. But some of the rhetoric could be overblown, says Benjamin Friedman, a research fellow in defense and homeland security studies at the Cato Institute.

Tags: In Depth , Francis Rose , Earl Devaney , Reznick Government , RATB , Tom Shoop , GovExec , Catherine Lotrionte , Ben Friedman , Cato Institute , sequestration , Mike Sullivan , GAO , F-35 II

Wednesday - 06/20/2012, 01:39am EDT

In Depth interviews - June 14

On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.

Tags: In Depth , Francis Rose , John McHugh , Army , Richard Fontaine , Lee Dougherty , General Counsel P.C , Steve Bucci ,

Friday - 06/15/2012, 01:23am EDT

Cybersleuths see link between Flame, Stuxnet virus

Cybersecurity researchers said Monday that they'd found a link between the infrastructure-wrecking cyberweapon known as Stuxnet and the recently- discovered Flame virus possibly offering a new clue about the latter's origins.

Tags: technology , cybersecurity , Flame

Monday - 06/11/2012, 03:48pm EDT

Risks of boomerangs a reality in world of cyberwar

The Obama administration is warning American businesses about an unusually potent computer virus that infected Iran's oil industry even as suspicions persist that the United States is responsible for secretly creating and unleashing cyberweapons against foreign countries.

Tags: President Barack Obama , cybersecurity , Flame , DHS , CIA , cybersecuirty update

Saturday - 06/02/2012, 09:11am EDT

White House directive behind Stuxnet virus

The New York Times reports the efforts, code name "Olympic Games", began during the Bush administration and one of the strings of code that accidentally became public became known as Stuxnet.

Tags: Cybersecurity Update , technology , White House , New York Times , In Depth

Friday - 06/01/2012, 08:53pm EDT
  • 1