Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: cybersecurity report
Cyber criminals have stolen the identity of some high ranking officials around the world, including the head of Interpol.
A new online cybersecurity degree program - being offered by the University of Maryland this fall - saw the enrollment of over 200 students on just the first day it was offered. Graduates will be trained to defend against cyberattacks, from both technical and policy-setting standpoints. University officials anticipate thousands will enroll. Because the course work is completely online, most of the students enrolled are expected to be working professionals looking to change careers.
A new list of the most vulnerable programs from the first half of 2010 hardly leaves anyone out. The report from M-86 Security Labs shows computers using Internet Explorer or Adobe Reader might be especially at risk, and that more Java-based vulnerabilities are also being actively exploited. The report also finds that attackers are finding new ways to bypass malware detection mechanisms.
A free service from the company Research In Motion now offers data and device protection for users of Blackberrys. It's called Protect, and for now is invite-only, and through a limited beta version, though the company plans to offer a more general, open beta later this year. It allows users to lock down their devices, and locate lost devices on a map. Reviewers with Information Week call it a credible option for smaller businesses and consumers.
Warnings have been posted about phony updates to the Abobe Flash program. Barracuda Networks says it found a number of compromised websites that take visitors to an official looking Flash update page. But, I-T experts say downloading the updates could infect a computer with malware. They offer a way to spot the fake pages; they only allows users to click on the "Continue" button. They warn, any updates must be taken directly from Adobe.
The General Services Administration is reiterating its promise to boost cybersecurity and privacy of cloud computing.
As part of the so-called FEDRAMP program, beginning this fall an interagency group will inspect vendors' cloud computing facilities to make sure they meet federal security standards. If the group certifies a cloud facility, agencies would be able to sign up for service without having to further inspect the facility.
U.S. officials have largely ruled out North Korea as the origin of a computer attack last July that took down U.S. and South Korean government websites.
But, authorities aren't much closer than they were a year ago to knowing exactly who did it, or why.
Early analysis of the fast-moving "denial of service" attacks pointed to North Korea since code used included Korean language.
Experts say agencies are better prepared today, but that many government and business sites remain vulnerable to similar attacks.
The so-called "continuous monitoring" of systems is becoming a hot topic in government. That's because under federal guidelines, agencies must report how they protect their information systems, plus, agencies are now required to submit real-time data about the state of their networks.
Continuous monitoring doesn't mean systems have to be watched every minute. Even now, some agencies are able to monitor their systems through international networks at least once a day.
A new study that finds 80-percent of I-T managers expect network-born threats to increase over the next year. Perhaps even more troubling, more than half of managers told netForensics their organization was not budgeting enough, or recruiting enough new talent, to counter any added cyber-threats. Almost 25-percent of respondents said they saw a decrease in staff size in the last year.
More than half of the managers polled did however say their organization was more secure now than it was a year ago.
A software trade association has produced a first-of-its-kind cybersecurity framework to help guide governments' security efforts worldwide. Officials with the Business Software Alliance say it's needed to help countries put together policies that will thwart the many kinds kinds of cybersecurity threats that exist.
Working with the private sector and prosecuting cyber-criminals are key parts of the framework.