bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
1:52 am, November 26, 2014

Search Result

Search Tags:  cyber security

Center watches cyber threats

Ever hear of the Multi-State Information Security and Analysis Center? It's a division of the Center for Internet Security. Their focus is cyber threat prevention, protection, response and recovery for state, local territory and tribal governments. Their objectives iclude providing two-way sharing of information and early warnings on cyber security threats, dissemination of information on cyber security incidents, to promote awareness and coordinate training.

Tags: cybersecurity , J.J. Green , UMUC , The Cyber Security Report

Thursday - 07/18/2013, 01:20pm EDT

Cyber warriors are targets

Will exploit developers become potential targets of state-sponsored assassinations in the future -like the nuclear scientists in recent times? There's been some discussion in the "Tech" community regarding the legitimacy of using lethal force against civilian hackers. As a result some are wondering what the future might hold for exploit developers and other members of the cyber supply chain who are facilitating state-funded, offensive cyber operations.

Tags: cybersecurity , J.J. Green , UMUC , The Cyber Security Report

Thursday - 07/18/2013, 01:19pm EDT

What are hackers after

We hear a lot about zero-day attacks and system vulnerabilities, but most hackers look for easier enterprises like the application used to access the Web. That's the one most online attackers will target. Why? Because most attackers and online exploit kit designers realize that the common browser is usually an endpoint's weakest link. Not only are enterprises generally slow to keep up with browser patching, they're downright sluggish at updating plug-ins and extensions.

Tags: cybersecurity , J.J. Green , UMUC , The Cyber Security Report

Thursday - 07/18/2013, 01:17pm EDT

Chinese hackers identified

Earlier this year information security firm Mandiant identified a previously unknown group hackers thought to be in China. "People referred to China or Chinese hackers, but there was plenty of wiggle room there to assume it could be a collection of guys working in someone's basement without a tie to the government," Richard Behtlich chief security officer for Mandiant. The group the identified is called Unit 61398. Bejtlich says, "we showed pretty conclusively that at least this one group is part of the PLA" AKA The Chinese People's Liberation Army.

Tags: J.J. Green , Cyber Security Report , UMUC

Monday - 07/15/2013, 10:44am EDT

Police warned about hackers

Law enforcement and first responders have been put on notice --their mobile phones are targets for hackers. They've been informed in roll call bulletins that hackers, by compromising mobile technology and exploiting vulnerabilities in portable operating systems, application software, and hardware. Compromise of a mobile device can have an impact beyond the device itself; malware can propagate across interconnected networks.

Tags: J.J. Green , Cyber Security Report , UMUC

Tuesday - 07/09/2013, 03:54pm EDT

Section

Tags: cybersecurity , J.J. Green , UMUC , The Cyber Security Report

Tuesday - 07/09/2013, 03:31pm EDT

Stopping Advanced Persistent Threats (APTs)

T.K. Keaninni, chief technology officer for nCircle joins host John Gilroy to talk about how his company can help your agency with its network security issues.
June 26, 2012

Tags: technology , cyber attacks , Flame , Stuxnet , advanced persistent threats , nCircle , network security , TK Keaninni , NIST , security content automation protocol , CISSP , John Gilroy , Federal Tech Talk

Tuesday - 06/26/2012, 11:08pm EDT
Listen

A look at NDU's iCollege

Members of the faculty at National Defense University's iCollege join host Derrick Dortch to talk about the school and how it can benefit federal managers.
February 3, 2012(Encore presentation February 10, 2012)

Tags: workforce , National Defense University , iCollege , information technology , emerging technologies , Dr. Robert Childs , Dr. Paulette Robinson , Adrienne Ferguson , Dr. John Saunders , Gil Duvall , information assurance , crisis management , Derrick Dortch , Fed Access

Friday - 02/03/2012, 10:37pm EST
Listen

What's new at Unisys?

Steve Vinsik, vice president and partner, Global Security Solutions for Unisys Corporation, joins host John Gilroy to talk about biometrics, border protection, air cargo, and telework.
January 3, 2012

Tags: technology , Unisys , biometrics , border protection , telework , NSTIC , biometric security , Unisys Security Index , malware , Steve Vinsik , John Gilroy , Federal Tech Talk , cloud computing ,

Tuesday - 01/03/2012, 09:05pm EST
Listen
  •  
  • 7
  •