Search Results


ISIS cyber capability judged more 'aspirational' than operational -- FCW

09/17/2014

ISIS cyber capability judged more 'aspirational' than operational ... a "digital caliphate" for launching attacks on U.S. critical infrastructure. ... Cole said he hopes Cyber Command attacks ISIS online because it would be an important ...

http://fcw.com/articles/2014/09/17/isis-cyber-capability.aspx

OPM terminating USIS background-check contract -- FCW

09/10/2014

Close this Advertisement ... "all the markings of a state-sponsored attack," and maintained that it should not be punished for having "self-detected this cyber-attack and reported it immediately to OPM, to other government agencies and to ...

http://fcw.com/articles/2014/09/10/opm-fires-usis.aspx

NOAA plots successor to climate modeling supercomputer -- FCW

09/09/2014

Close this Advertisement ... NOAA plots successor to climate modeling supercomputer ... WHY: Faster and more powerful supercomputers enable more precise and long-term ... Raising the stakes: NATO says a cyber attack on one is an attack on all

http://fcw.com/blogs/the-spec/2014/09/noaa-climate-modeling.aspx

Continuous monitoring dashboard contract not a done deal -- FCW

09/09/2014

Continuous monitoring dashboard contract not a done deal ... By Mark Rockwell ... Industry sources familiar with the acquisition questioned statements made by former ... Raising the stakes: NATO says a cyber attack on one is an attack on all

http://fcw.com/articles/2014/09/09/dhs-cdm-dashboard-update.aspx

Security clearances, contractor oversight, NATO cyber and more

09/08/2014

http://fcw.com/articles/2014/09/08/news-in-brief-september-8.aspx

DHS picks RSA Archer for CDM dashboard -- FCW

09/08/2014

Tweet ... GRC is the latest commercial tool to be added to the CDM program. ... In August, the General Services Administration awarded blanket purchase agreements to ... Raising the stakes: NATO says a cyber attack on one is an attack on all

http://fcw.com/articles/2014/09/08/rsa-archer-cdm.aspx

Combatting Insider Threats in the Federal Agency with Endpoint Security Analytics -- FCW

09/03/2014

Federal agencies are under attack from cyber-criminals and under scrutiny from Congress, but what about the potentially catastrophic insider threat? ... Most cyber-defense tools face outward, not inward, and do not offer a view of your ...

http://fcw.com/whitepapers/2014/09/guidance-software_-combatting-insider-threats-wp_090314.aspx

News in Brief: USDS additions, Google dorking, Genachowski's new gig, very real virtual cyber-risks and more -- FCW

08/29/2014

According to the memo, last October, unidentified attackers used Google dorking to find websites running vulnerable versions of a proprietary Internet ... "One of the more recent exploits involves attacks that are designed to wait out the ...

http://fcw.com/articles/2014/08/29/news-in-brief-aug-29.aspx

White House fellows, dire debt predictions and more -- FCW

08/27/2014

... also served as special assistant to the senior leadership team that created the U.S. Cyber Command. ... GSA announces contract for its own cyber protection ... security events and prevent attempted attacks from disrupting agency priorities.

http://fcw.com/articles/2014/08/27/news-in-brief-august-27.aspx

Cyber Threat Intelligence: How to Leverage Emerging Tools and Tactics -- FCW

08/20/2014

Cyber Threat Intelligence: How to Leverage Emerging Tools and Tactics ... Attackers do not knock on the door and ask permission to enter your enterprise. ... distributed denial-of-service (DDOS) attacks, phishing, malware, zero day exploits, ...

http://fcw.com/videos/2014/08/hp-cyber-threat-intelligence-082014.aspx