9:06 am, May 30, 2015

Search Result

Search Tags:  cybersecurity

Supply chains found vulnerable to cyberthreat

A new report finds the vast majority of U.S. supply chains rely on information technologies that can be compromised at any time. We get details from Tom Wilkerson, CEO of the Naval Institute.

Tags: Federal Drive , Cybersecurity , supply chain , CACI International , USNI , US Naval Institute , Tom Wilkerson

Friday - 08/06/2010, 09:30am EDT

Meeting the global cybersecurity threat

Securing cyber-space has become a global challenge, and the GAO has ideas about what agencies can do to be prepared.

Tags: DorobekInsider , Cybersecurity , GAO , David Powner

Thursday - 08/05/2010, 09:41pm EDT

Is DoD fighting an asymetric cyber war?

One professor explains why DoD needs to be concerned about using social media.

Tags: Technology , management , DoD , George Mason University , Paul Strassmann , Cybersecurity , Cybersecurity Update , Dorothy Ramienski , DorobekInsider

Thursday - 08/05/2010, 04:30pm EDT

DHS tests power plant cybersecurity

Security Threat Report reveals attitudes to cyberwarfare, Patch or we go public, says bug bounty program

Tags: Cybersecurity Update , Cybersecurity , DHS , SophosLabs , Beth Jones , CERT , Tipping Point , Zero Day Initiative , Federal Drive

Thursday - 08/05/2010, 08:30am EDT

House Cybersecurity Caucus creates awareness website

Learn more in today's cybersecurity update.

Tags: telework , Cybersecurity , Cybersecurity Update , House Cybersecurity Caucus

Wednesday - 08/04/2010, 04:36pm EDT

Federal cyber roles debated

New threat: Hackers look to take over power plants

Tags: Federal Drive , Cybersecurity Update , Cybersecurity , DHS , Critical infrastructure

Wednesday - 08/04/2010, 08:30am EDT

Public-private partnership catches creator of botnet

Learn more in today's cybersecurity update.

Tags: Technology , Cybersecurity , Cybersecurity Update , Rodney Joffe , Neustar , Mariposa botnet , DorobekInsider

Tuesday - 08/03/2010, 04:51pm EDT

New Energy report outlines cybersecurity weaknesses

The vulnerabilities of critical energy infrastructure installations to potential cyber attack are normally treated as restricted information and are exempt from public disclosure.

Tags: newscast , DorobekInsider , Must Reads , Cybersecurity

Tuesday - 08/03/2010, 01:29pm EDT

Viruses found embedded in smartphone apps

DOE raises concern over safety of electric grid

Tags: Federal Drive , Google , smartphones , DoE , Cybersecurity , Cybersecurity Update

Tuesday - 08/03/2010, 08:30am EDT
  • 243