Search Results


Inside Continuous Monitoring, Insider Threat and Beyond - Session 1 -- FCW

03/26/2015

Visibility across your network – in real-time - is a critical necessity for combating today’s increasing cyber attacks and security breaches. ... Consequences of a ‘do nothing’ approach ... Solutions to monitor and mitigate cyber attacks

http://fcw.com/webcasts/2015/03/dlt-3x-continuous-monitoring-032615.aspx

Risk Management: Getting Ahead of the Cyber Crisis -- FCW

03/17/2015

Risk Management: Getting Ahead of the Cyber Crisis ... The most important work in cybersecurity occurs before an attack begins. ... monitor, and conduct business impact assessments so they are prepared for when a cyber crisis strikes.

http://fcw.com/webcasts/2015/03/riverbed-risk-management-031715.aspx

What to make of the Sony hack -- FCW

03/03/2015

The cyber security hack suffered by Sony Pictures Entertainment late last year was a ... And numerous cyber forensic experts questioned the FBI findings. ... Tracing cyber-attacker's footsteps can be difficult because of their ability to ...

http://fcw.com/articles/2015/03/03/comment-sony-hack-lessons.aspx

DNI worries about cumulative, not catastrophic, cyber threat -- FCW

02/26/2015

"Cyber armageddon" is a variation of the "cyber Pearl Harbor" doomsday metaphor frequently ... The cyber threat to U.S. critical infrastructure is real. ... The attack on Sony Pictures has been called one of the biggest corporate hacks ever.

http://fcw.com/articles/2015/02/26/cumulative-cyber-threat.aspx

Cyber gets a boost in VA budget request -- FCW

02/26/2015

Veterans Affairs Cyber gets a boost in VA budget request By Adam Mazmanian ... inspection on incoming and outgoing traffic, identifying intrusions, malware, and other attacks. ... How (and why) the CIA plans to expand cyber capabilities

http://fcw.com/articles/2015/02/26/cyber-budget-boost.aspx

How (and why) the CIA plans to expand cyber capabilities -- FCW

02/24/2015

How (and why) the CIA plans to expand cyber capabilities ... category of operations," from recruiting informants to attacking the Islamic State, the Post ... The reported cyber plans are part of a larger, ongoing reevaluation of the agency's ...

http://fcw.com/articles/2015/02/24/cia-expand-cyber.aspx

NSA's Rogers makes the case for cyber norms -- FCW

02/23/2015

... and concepts of deterrence can help prevent cyber conflicts from spiraling out of control, National ... Cyber Command’s mission includes defending Defense Department networks and, when directed, carrying out attacks on foreign cyber assets.

http://fcw.com/articles/2015/02/23/nsa-rogers-cyber-norms.aspx

Cyber threat challenges military structure -- FCW

02/23/2015

By Sean Lyngaas ... Edward Cardon, head of Army Cyber Command. ... The head of Army Cyber Command reflected on different ways to build the cyber forces the Army seeks. ... Following attack, intruders still cooling in State Department network

http://fcw.com/articles/2015/02/23/cyber-threat-challenges-military.aspx

Feds respond to critical Windows flaw -- FCW

02/11/2015

Feds respond to critical Windows flaw ... An attacker could exploit the flaw to gain user access to affected systems, including administrative access, depending on how the attack is directed. ... Congress moves cyber-hiring, FISMA measures

http://fcw.com/articles/2015/02/11/feds-respond-to-critical-flaw.aspx

How Congress can make cyber reforms real -- FCW

02/10/2015

Commentary How Congress can make cyber reforms real By Dave McClure ... , industry and government were rocked by major cyber breaches and attacks that highlighted continued vulnerabilities in ... Congress moves cyber-hiring, FISMA measures

http://fcw.com/articles/2015/02/16/mcclure-how-congress-can-make-cyber-reforms-real.aspx

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.