Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: Stuxnet
A look at the events shaping cybersecurity policy in the federal government over the past six years.
The mysterious Gauss cyber-surveillance malware has experts stumped. Kaspersky Lab, a Moscow-based security vendor, has been dissecting Gauss.
T.K. Keaninni, chief technology officer for nCircle joins host John Gilroy to talk about how his company can help your agency with its network security issues.
June 26, 2012
Tags: technology , cyber attacks , cyber security , Flame , advanced persistent threats , nCircle , network security , TK Keaninni , NIST , security content automation protocol , CISSP , John Gilroy , Federal Tech Talk
House Intelligence Committee Chairman Mike Rogers said he'd be "very careful" about assigning blame for the attacks on Iran's nuclear program. Half of what's been reported in the media on the matter is untrue, he said.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources. Across-the-board mandatory cuts have a lot of people on edge, especially those who work closely with the Defense Department. Across-the-board mandatory cuts have a lot of people on edge. But some of the rhetoric could be overblown, says Benjamin Friedman, a research fellow in defense and homeland security studies at the Cato Institute.
On the In Depth show blog, you can listen to the interviews, find more information about the guests on the show each day and links to additional resources.
Cybersecurity researchers said Monday that they'd found a link between the infrastructure-wrecking cyberweapon known as Stuxnet and the recently- discovered Flame virus — possibly offering a new clue about the latter's origins.
The Obama administration is warning American businesses about an unusually potent computer virus that infected Iran's oil industry even as suspicions persist that the United States is responsible for secretly creating and unleashing cyberweapons against foreign countries.
The New York Times reports the efforts, code name "Olympic Games", began during the Bush administration and one of the strings of code that accidentally became public became known as Stuxnet.