Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: cyber security
We hear a lot about zero-day attacks and system vulnerabilities, but most hackers look for easier enterprises like the application used to access the Web. That's the one most online attackers will target. Why? Because most attackers and online exploit kit designers realize that the common browser is usually an endpoint's weakest link. Not only are enterprises generally slow to keep up with browser patching, they're downright sluggish at updating plug-ins and extensions.
Earlier this year information security firm Mandiant identified a previously unknown group hackers thought to be in China. "People referred to China or Chinese hackers, but there was plenty of wiggle room there to assume it could be a collection of guys working in someone's basement without a tie to the government," Richard Behtlich chief security officer for Mandiant. The group the identified is called Unit 61398. Bejtlich says, "we showed pretty conclusively that at least this one group is part of the PLA" AKA The Chinese People's Liberation Army.
Law enforcement and first responders have been put on notice --their mobile phones are targets for hackers. They've been informed in roll call bulletins that hackers, by compromising mobile technology and exploiting vulnerabilities in portable operating systems, application software, and hardware. Compromise of a mobile device can have an impact beyond the device itself; malware can propagate across interconnected networks.
T.K. Keaninni, chief technology officer for nCircle joins host John Gilroy to talk about how his company can help your agency with its network security issues.
June 26, 2012
Tags: technology , cyber attacks , Flame , Stuxnet , advanced persistent threats , nCircle , network security , TK Keaninni , NIST , security content automation protocol , CISSP , John Gilroy , Federal Tech Talk
Members of the faculty at National Defense University's iCollege join host Derrick Dortch to talk about the school and how it can benefit federal managers.
February 3, 2012(Encore presentation February 10, 2012)
Tags: workforce , National Defense University , iCollege , information technology , emerging technologies , Dr. Robert Childs , Dr. Paulette Robinson , Adrienne Ferguson , Dr. John Saunders , Gil Duvall , information assurance , crisis management , Derrick Dortch , Fed Access
Steve Vinsik, vice president and partner, Global Security Solutions for Unisys Corporation, joins host John Gilroy to talk about biometrics, border protection, air cargo, and telework.
January 3, 2012
Tags: technology , Unisys , biometrics , border protection , telework , NSTIC , biometric security , Unisys Security Index , malware , Steve Vinsik , John Gilroy , Federal Tech Talk , cloud computing ,
Faced with rapid technological advancements and increasingly sophisticated cyber attacks, organizations must act now to acquire or improve cyber resilience to protect their agencies or departments from theft, fraud and sabotage. Experience has shown that cyber resilience requires a coordinated approach across five areas: policy and compliance; budget; the IT enterprise architecture; acquisitions, and security operations. Determining where to focus first is often difficult. Many organizations begin with a situational assessment of their cyber health within the context of the current environment and their own business and mission imperatives. From there, organizations can quickly prioritize problems -business processes, operational, technological or personnel - and take decisive actions that will enhance cyber resilience and help reduce risk.
They are back online now, but it was a tough week for the U.S. Marshals Service. A good old fashioned computer virus infected the agencies' PCs. That forced officials to disconnect them from the Internet for a few days while the tech staff performed a clean out and upgrade. Turns out that for the Marshals, only 140 machines were affected. But the incident reinforced the basic cyber security advice: Keep your anti-virus software updated. I'm Tom Temin.
Watch or listen to this program on demand below