bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
6:19 am, September 20, 2014

Search Result

Search Tags:  cyber security

The Cybersecurity Imperative

All agencies are fighting cyber-attacks. The FBI Director of Cyber Security believes there are two groups of organizations: those whose systems have been attacked and those who do not know they have been attacked. In the federal space, the velocity and variety of attacks has dramatically increased. With Advanced Persistent Threats (APT), the time it can take to comprise a system ranges from hours to days, yet the time it takes for its discovery averages 6 months. The cyber security solution has shifted from the perimeter (firewall) or how to stop the attacks to how to deal with the attacks after they occur. The emphasis is now on the controls and minimizing what the attacker is doing once he gets in. The cost of the attacks is down time and data loss. With a 200% to 300% increase in attacks on agency's systems, it is imperative the federal government implements a holistic solution including hardware, software, training and compliance.

Tags: NetApp , WWT , The Cybersecurity Imperative , Ari Baranoff , Lee Vorthman , Aamir Lakhani , Leo Scanlon

Tuesday - 07/16/2013, 11:21am EDT
Listen

Baked-in cybersecurity goodness

Experts say that one way to eliminate cybersecurity vulnerabilities is to build cyber defenses into the wide range of information technology devices that are rapidly becoming part of the "Internet of things". Baked-in cybersecurity is the goal of new draft guidelines recently proposed by the National Institute of Standards and Technology. In this edition of "AFCEA Answers", Dr. Ron Ross, senior computer scientist and information security researcher with NIST, joins us to discuss SP 800-160, proposals which would mandate the design of cyber protection into the hardware and software of the next generation of IT products and services. Also, Dr. Ross discusses how SP 800-160 is part of the continuing work on the federal government's cybersecurity framework.

Tags: AFCEA , AFCEA Answers , Max Cacas , Ron Ross , technology , NIST , IT

Thursday - 05/22/2014, 05:12pm EDT

SEC to look into cyber health of investment advisers

The Securities and Exchange Commission is asking 50 registered investment advisers and broker-dealers for more information about how they protect their systems from cyber attacks.

Tags: SEC , OCIE , cybersecurity , National Institue of Standards and Technology , cybersecurity exams

Monday - 04/28/2014, 11:51am EDT

Universities awarded $800,000 grant for cyber research

Three universities will share an $800-thousand dollar grant from FEMA. The money will be used to help the U.S. better prepare for cyber attacks.

Tags: GDIT Solutions Center , cyber attacks , FEMA , National Cybersecurity Preparedness Consortium

Monday - 04/21/2014, 02:27pm EDT

The 2014 Big Picture on Cyber Security

Because of the changing threat environment and the need for continuous network monitoring, cybersecurity has become a data analysis activity. A big data problem. CIOs, security officers and program managers concerned with the integrity of systems must find a way to integrate data coming in from perimeter appliances, network logs, and a variety of security information and event management (SIEM) tools. Operators must correlate this data stream with rules governing what it is they are guarding against. That could be malware, data exfiltration, or insider activity.

This panel will explore ways federal agencies are dealing with the big data and analysis challenges of today's cybersecurity environment.

Tags: TIBCO , technology , Frank Konieczny , Rod Turk , Matt Quinn

Wednesday - 02/19/2014, 11:19am EST
Listen

China forms cyber security department

Chinese President Xi Jinping, according to the Associated Press, "has put himself in charge of a new body to coordinate cyber security, in a sign of Beijing's concern over its vulnerability to online attacks and its desire to retain tight control over the Internet." AP says Chinese state media reports the central Internet security and information leading group will draft policy for boosting the country's defenses, as well as expanding and improving Internet access.

Tags: The Cyber Security Report , J.J. Green , UMUC ,

Monday - 03/03/2014, 09:37am EST

Bitcoins Disappear

The Mt. Gox bitcoin exchange in Tokyo filed for bankruptcy protection Friday and its chief executive said 850,000 bitcoins, worth several hundred million dollars, are unaccounted for. The exchange's CEO Mark Karpeles appeared before Japanese TV news cameras, bowing deeply. He said a weakness in the exchange's systems was behind a massive loss of the virtual currency involving 750,000 bitcoins from users and 100,000 of the company's own bitcoins. That would amount to about $425 million.

Tags: The Cyber Security Report , UMUC , J.J. Green ,

Monday - 03/03/2014, 09:34am EST

Banks and retailers bury the hatchet on Cyber

U.S. banks and retail groups say they are joining forces to work on cyber security, getting past recent finger pointing for data breaches. The Financial Services Roundtable, Retail Industry Leaders Association and several other trade associations said the new partnership would focus on sharing more information on cyber threats.

Tags: UMUC , J.J. Green , The Cyber Security Report ,

Friday - 02/14/2014, 04:27pm EST

Mixed Messages for NSA

Utah lawmakers are sending mixed messages to the National Security Agency, which runs a massive data-storage warehouse outside of Salt Lake City. One proposal is calling for legislators not to collect utility taxes from the center. Meanwhile, another lawmaker wants to cut off water to the center, which uses more than 1 million gallons daily to cool its computer processers.

Tags: UMUC , J.J. Green , The Cyber Security Report ,

Friday - 02/14/2014, 04:25pm EST

FINRA reviewing security

The Financial Industry Regulatory Authority is looking at the measures that Wall Street's brokerages take to protect their businesses and customers from cyber security threats. FINRA, which conducts periodic "sweeps," or targeted checks on Wall Street brokerages, says it is conducting the review, in part, because of the growing threat to information technology systems from "a variety of sources.

Tags: J.J. Green , UMUC , The Cyber Security Report ,

Monday - 02/10/2014, 08:46am EST
  • 1
  •