bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
4:14 pm, August 23, 2014

Search Result

Search Tags:  cybersecurity

Architecting Defense-in-Detail

August 11th at 11:05am

The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled' position to one that is now ‘network dependent.' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries.

The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.

Tags: technology , CA Technologies , Dynamic Cybersecurity , Tim Brown , security , Robert Brese , DoE , Gary Galloway , State

Monday - 08/02/2010, 12:34pm EDT
Listen

CyberSecurity-"Progress & Best Practices"

August 10th at 12PM

Program will discuss the progress report on CyberSecurity in the federal government,top cybersecurity priorities, key challenges to still overcome in IT Security, lessons learned, and a vision for the future - how can we be proactive and prevent attacks?

Tags: technology , Federal Executive Forum , Greg Schaffer , DHS , Rob Carey , Navy , Pat Howard , Joseph MOorcones , SafeNet , Sam Chun , HP , Ed White , McAfee , Jim Flyzik , Trezza , Flyzik Group

Monday - 08/02/2010, 10:42am EDT

Government contractor monitors U.S. internet providers

Microsoft Quashed Effort to Boost Online Privacy, Hacker builds $1,500 cell-phone tapping device

Tags: Federal Drive , Cybersecurity Update , Project Vigilant , Microsoft , Defcon

Monday - 08/02/2010, 08:30am EDT

Feds seek right role for protecting .com domain

With so much at stake, what role, if any does the federal government play in protecting the .com Internet domain? Several experts offer some candid observations on what the government's role should be.

Tags: technology , Commerce , NIST , Patrick Gallagher , cisco , Don Proctor , RSA , Mischel Kwon , CSIS , James Lewis , Max Cacas

Monday - 08/02/2010, 06:30am EDT
Listen

Verizon: Most data breaches avoidable

A new report shows stunning results.

Tags: technology , DorobekInsider , best practices , management , Wade Baker , Verizon , Secret Service , contracting

Friday - 07/30/2010, 04:10pm EDT
Listen

Cybersecurity and fighting the insider-threat

Our Federal News Radio Discussion this month explores cybersecurity and the insider-threat with Jerry Davis of NASA, NIST's Elaine Newton, and Bobbie Stempfley from DHS.

Tags: Federal Drive , technology , Meeting Mission Goals Through Technology , Jerry Davis , NASA , Elaine Newton , NIST , Bobbie Stempfley , DHS , Federal News Radio Discussion , Suzanne Kubota

Friday - 07/30/2010, 11:00am EDT
Listen

Cyber key-masters needed to restart the internet

The seven members of this holy order of cyber security hail from around the world and recently received their keys while locked deep in a U.S. bunker.

Tags: Federal Drive , Cybersecurity Update , ICANN , key masters

Friday - 07/30/2010, 08:30am EDT

NIST is epicenter for cybersecurity

Learn more in today's cybersecurity update.

Tags: technology , Cybersecurity Update , NIST

Thursday - 07/29/2010, 04:18pm EDT

Could a single hacker crash a country's network?

Could one person bring down everything?

Tags: newscast , DorobekInsider , Must Reads ,

Thursday - 07/29/2010, 12:58pm EDT
  •  
  • 215
  •