Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: hackers
Chinese hackers were able to access information about the Chamber's operations and its 3 million members.
Hackers are sending out malware disguised as a file in an email from security firm Symantec.
How safe are the nation's critical networks? Several years ago Chinese hackers were caught trying to break into sensitive government and military systems. They've progressed from that to Congress. Last year, two members of Congress said their systems had been hacked into and sensitive information destroyed. The news that they struck again --hitting the Joint Strike fighter a couple of years ago, comes as no surprise to many in the cyber world. The Obama administration is preparing to release a review of the nation's cyber security.
Many feds think cybersecurity is underfunded
Malaysia said it wants to get to know a bigger circle of hackers in an effort to channel their dis-satisfaction and grievances in a positive way.
Google says Chinese hackers attempted to take over email accounts of senior U.S. officials and hundreds of other prominent people.
Companies of all sizes find they need protection from cyber attacks.
Technology Review reports on research that shows how hackers can disable your mobile devices.
People's Daily has a helpful checklist.