Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: hacking
Federal and military websites are under fire from hackers, according to Richard Stiennon, host of the "Threat Chaos" blog. He told Federal News Radio what he thinks needs to be done to fix that problem.
The hacker intelligence initiative has unearthed evidence that dozens of sites are up for sale, including defense and federal sites.
A new report found that for 15 minutes in April a Chinese state controlled telecommunications company was able to hijack 15 percent of the world's internet traffic.
When a pilot program developed by the D.C. Board of Elections and Ethics was put to a security test, it failed miserably.
Social engineering targets you in a cyber attack -- often with your help. The DorobekINSIDER's guests were Chris Hadnagy operations manager at Offensive Security; Jim O'Gorman, consultant at Continuum Worldwide; and Mati Aharoni, the founder of Offensive Security.
A study by SpiderLabs, a part of the data-security consulting company Trustwave, found 38 percent of last year's credit card hacking charges involved the hotel industry.
But is it legal? Learn more in today's cybersecurity update.
The Montgomery County school system is investigating whether students hacked into the grading system.