bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
8:43 am, April 23, 2014

Search Result

Search Tags:  cyber security

Companies need to know when they are hacked

Recently several large U.S. companies were hacked online and like other victims of similar attacks, they were not aware until well after the attack happened. In some cases it was months. Online security firm Mandiant says, often attacks are blamed on malware, but they say 46% of compromised machines have no malware on them. Mandiant says hackers can navigate through conventional safeguards easily leaving little or no trace.

Tags: The Cyber Security Report , J.J. Green , UMUC ,

Tuesday - 01/21/2014, 10:20am EST

Online shopping risks grow

Devices such as smartphones and tablets are being used more and more often for online shopping and the Center for Internet Security is warning that means the volume of attacks against them will increase as well. The "center" says every time you download an app, you open yourself to potential vulnerabilities. Their advice is to research those apps you plan to download to verify their legitimacy. Update all apps when notified and disable Bluetooth and Near Field Communications when not in use to reduce the risk of your data, such as a credit card number, being intercepted by a nearby device.

Tags: UMUC , J.J. Green , The Cyber Security Report

Tuesday - 01/21/2014, 10:21am EST

Online shopping rules evolve

How do you shop securely online. The Center for Internet Security says you should "know your online merchants. Limit online shopping to merchants you know and trust. Only go to sites by directly typing the URL in the address bar. If you are unsure about a merchant, check with the Better Business Bureau or the Federal Trade Commission to ensure its legitimacy. Confirm the online seller's contact information in case you have questions or problems. Use a credit card, not a debit card. Credit cards are protected by the Fair Credit Billing Act and may reduce your liability if your information is used improperly.

Tags: UMUC , J.J. Green , The Cyber Security Report ,

Tuesday - 01/21/2014, 10:25am EST

Evidence of system hacks varies

How can you tell if your system has been compromised? Internet security firm Mandiant says there are numerous signs. Included are evidence of unauthorized use of valid accounts, trace evidence & partial files, command and control activity, known and unknown malware, suspicious network traffic, valid programs used for other purposes and files that have obviously been accessed by attackers. IT managers are reminded that threats can slip in undetected and lay dormant for long periods of time before striking.

Tags: UMUC , J.J. Green , The Cyber Security Report ,

Tuesday - 01/21/2014, 10:26am EST

CyberSecurity "Progress & Best Practices" Defense & Homeland 2014

Listen Tuesday January 28th @ 12pm
Program will discuss the following: Progress Report on CyberSecurity in Government, Profiles of Successful Cyber Programs, Top Priorities, Challenges still to overcome, and A Vision for The Future in CyberSecurity.

Tags: Trezza Media Group , Brendan Goode , Louis Tempkin , Jason Wright , LTG Ed Cardon , Marshall Lytle , Scott Stevens , Dell Software , General Dynamics Information Technology , Sourcefire

Thursday - 01/16/2014, 02:58pm EST

Britain pulls plug on spy cans

Officials say that an advertising firm must immediately stop using its network of high-tech trash cans to track people walking through London's financial district. The City of London Corporation says it has demanded Renew pull the plug on the program, which measures the Wi-Fi signals emitted by smartphones to follow commuters as they pass the garbage cans.

Tags: cybersecurity , The Cyber Security Report , J.J. Green , UMUC

Tuesday - 10/08/2013, 10:51am EDT

Adobe Source Code stolen

Kelly Jackson Higgins wrote in her "Hacking The Adobe Breach" column, "At first glance, the massive breach at Adobe that was revealed last week doesn't neatly fit the profile of a pure cybercrime attack." She said not only did the bad guys steal customer data and payment info, but they also got ahold of the company's source code for Adobe's ColdFusion, Acrobat, and Reader software. Criminal investigators are looking into whether it was an accident or they deliberately went after the source code.

Tags: cybersecurity , The Cyber Security Report , J.J. Green , UMUC

Tuesday - 10/08/2013, 10:53am EDT

AFCEA Answers - Cyber Security Awareness

The "persistent threat" is becoming the hallmark of how government and industry deal with cybersecurity concerns, particularly threats to the nation's electrical grid and critical infrastructure. Plus: how is industry and government training and retaining top cybersecurity professionals? On this edition of "AFCEA Answers", we'll explore these topics with Dr. Ernest McDuffie from NIST; Mike Peterson, Vice President with URS, former Air Force CIO; and Tom Conway, Director of Federal Business Development with McAfee.

Tags: AFCEA Answers , cybersecurity , Max Cacas , URS , McAfee , Mike Peterson , Ernest McDuffie , Tom Conway

Thursday - 10/03/2013, 06:38pm EDT
Listen

Security leaks could affect legislation

Recent revelations about secret U.S. surveillance programs could significantly impede progress on negotiations over new laws and regulations meant to beef up the country's defenses against the growing threat of cyber-attacks. Current and former cyber security officials say they worry the ongoing disclosures about secret National Security Agency spying programs by former NSA contractor Edward Snowden could trigger knee-jerk reactions by Congress or the private sector.

Tags: UMUC , The Cyber Security Report , cybersecurity , J.J. Green

Tuesday - 08/13/2013, 12:32pm EDT

How does DHS respond to Cyber incidents?

How does DHS detect and respond to malicious cyber activity. DHS also operates a cyber-information coordination center, the National Cybersecurity and Communications Integration Center (NCCIC), and several operational units. These units respond to incidents and provide technical assistance to information system operators. The NCCIC coordinates the information collected through these channels to create a common operating picture for cyber communities across all levels of government and the private sector.

Tags: UMUC , The Cyber Security Report , cybersecurity , J.J. Green

Tuesday - 08/13/2013, 12:30pm EDT
  •  
  • 4
  •