Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: hackers
Chinese hackers were able to access information about the Chamber's operations and its 3 million members.
Hackers are sending out malware disguised as a file in an email from security firm Symantec.
How safe are the nation's critical networks? Several years ago Chinese hackers were caught trying to break into sensitive government and military systems. They've progressed from that to Congress. Last year, two members of Congress said their systems had been hacked into and sensitive information destroyed. The news that they struck again --hitting the Joint Strike fighter a couple of years ago, comes as no surprise to many in the cyber world. The Obama administration is preparing to release a review of the nation's cyber security.
Many feds think cybersecurity is underfunded
Malaysia said it wants to get to know a bigger circle of hackers in an effort to channel their dis-satisfaction and grievances in a positive way.
Google says Chinese hackers attempted to take over email accounts of senior U.S. officials and hundreds of other prominent people.
Companies of all sizes find they need protection from cyber attacks.
Technology Review reports on research that shows how hackers can disable your mobile devices.
People's Daily has a helpful checklist.