bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
2:19 am, October 23, 2014

Search Result

Search Tags:  cybersecurity

DHS's Marshall: Supply chain management vital

The challenge of securing the nation's IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.

Tags: In Depth , Francis Rose , technology , DHS , Richard Marshall , National Cybersecurity Division , ISC2 , FBI , HP , Electronic Data Systems , Howard Schmidt , Barack Obama , Max Cacas

Tuesday - 06/08/2010, 07:09pm EDT
Listen

Analyst accused of leaking classified information

Bradley Manning was detained during a tour of duty in Iraq.

Tags: technology , Cybersecurity Update , DorobekInsider

Tuesday - 06/08/2010, 05:08pm EDT

Congress doesn't see cybersecurity's sex appeal

Google denies use of private data, Adobe warns of critical security flaw in its products

Tags: Federal Drive , Cybersecurity Update , Adobe , Google , Street View

Tuesday - 06/08/2010, 08:30am EDT

What Will CYBERCOM'S Mission Be?

The U.S. Cyber Command - or CYBERCOM - officially became operational in late May. But observers inside the military and out still aren't sure what the command is supposed to do: protect the Pentagon's networks, strike out at enemies, seal up civilian vulnerabilities, or some combination of all three. CYBERCOM officials insist they have no interest in taking over the security of the Internet, but Pentagon officials have floated the idea the Defense Department might start a protective program for civilian networks.

Tags: technology , Cybersecurity Report , U.S.Cyber Command , CYBERCOM , Pentagon , DoD , Scott Carr

Monday - 06/07/2010, 09:00pm EDT

CERT Releases New Fuzz Tester

Carnegie Mellon University's Computer Emergency Response Team (or CERT) has released a new fuzzing framework that will help identify and eliminate security vulnerabilities from different kinds of software. The fuzz testers are used by security researchers to find vulnerabilities by sending random input to an application. Fuzz testing has been popular among hackers, but with the release of this framework, CERT can push businesses to subject all software to fuzz testing.

Tags: technology , Cybersecurity Reports , CERT , Scott Carr

Monday - 06/07/2010, 08:58pm EDT

Network convergence could leave your phone vulnerable

Learn more in today's cybersecurity update.

Tags: technology , Cybersecurity Update , DorobekInsider

Monday - 06/07/2010, 04:20pm EDT
Listen

General Alexander, Raduege agree on cybersecurity rampup

Two cyber leaders concur on importance of moving past forensics to risk mitigation.

Tags: In Depth , Francis Rose , Keith Alexander , Harry Raduege , Center for Strategic and International Studies , Cyber Command

Monday - 06/07/2010, 03:56pm EDT
Listen

Cybersecurity box claims to block threats

New Australian zombie code in effect by December

Tags: Federal Drive , Cybersecurity Update , InZero , malware , Australia , Zombies

Monday - 06/07/2010, 09:35am EDT

U.S. needs coherent cyber-war policies

Learn more in today's cybersecurity update.

Tags: technology , Cybersecurity Update , DorobekInsider

Friday - 06/04/2010, 06:33pm EDT

Should cybersecurity reforms be reformed?

The House Cybersecurity Caucus says new provisions "will establish strong, centralized oversight to protect our nation's critical information infrastructure and update our comprehensive policy for operating in cyberspace." But will they? We ask Jim Lewis with CSIS

Tags: Federal Drive , technology , FISMA , Jim Lewis , Technology and Public Policy Program , CSIS

Friday - 06/04/2010, 10:40am EDT
Listen
  •  
  • 232
  •