Search Results


Cyber Risk Report 2015: Executive Summary -- FCW

05/28/2015

Cyber Risk Report 2015: Executive Summary May 28, 2015 ... of HP’s annual security research Cyber Risk Report details a threat landscape still ... environment is one in which well-known attacks and misconfigurations exist side-by-side with ...

http://fcw.com/whitepapers/2015/05/hpsp-052815-executive-summary-cyber-risk-report.aspx

Mobile Security: Confidence Ebbs as BYOD Booms -- FCW

05/26/2015

Security risks have grown roughly in proportion to the meteoric growth in employee- ... Meanwhile cyber-attacks are growing in sophistication and severity. ... According to data from a new IDG Research survey, these dynamics have IT decision ...

http://fcw.com/whitepapers/2015/05/dell-mobile-security-byod-booms-050815.aspx

Cracking down on poor cyber hygiene -- FCW

05/20/2015

Defense Cracking down on poor cyber hygiene By Sean Lyngaas ... a more data-rich template for assessing “cyber hygiene” – the prevalence of basic ... a memo warning about potential phishing attacks on defense personnel through third-party ...

http://fcw.com/articles/2015/05/20/cracking-down-on-cyber.aspx

House panel moves drone, FOIA, IT dupe bills -- FCW

05/20/2015

... how small and medium-sized unmanned aerial systems could be used in an attack, as well as how to prevent or mitigate the effects of such an attack. ... Committee and is a member of the Cyber Security Caucus, said emerging small drone ...

http://fcw.com/articles/2015/05/20/drone-foia-dupe-bills.aspx

State Department presents cyber norms to Congress -- FCW

05/18/2015

... in the hearing said he was “greatly concerned” by reports that China had attacked U.S. websites using a unique cyber weapon known as the “Great Cannon.” ... cyber incidents; should not conduct cyber-enabled intellectual property theft; and ...

http://fcw.com/articles/2015/05/18/state-cyber-norms.aspx

SAP NS2 Real-Time Cyber Situational Awareness -- FCW

05/15/2015

SAP NS2 Real-Time Cyber Situational Awareness ... designed for a traditional network and traditional attack patterns are no longer sufficient, as they cannot ... a greater anticipatory intelligence and more rapid resolution of cyber threats.

http://fcw.com/whitepapers/2015/05/sap-ns2-real-time-cyber-situational-awareness-051515.aspx

When shared services go bad -- FCW

05/14/2015

Tweet ... Cyber criminals are increasingly collaborating on malware and attacks, John Riggi, section chief for cyber division outreach at the FBI, said during a presentation at the ISC2's Cyber Secure Gov conference on May 14 in Washington.

http://fcw.com/articles/2015/05/14/shared-services-go-bad.aspx

Debating the Sino-Russian cyber pact -- FCW

05/12/2015

Cybersecurity Debating the Sino-Russian cyber pact By Sean Lyngaas ... “You have both of these huge cyber resources now cooperating, which means . ... makes the threat of a disruptive digital attack in retaliation for Western sanctions a real ...

http://fcw.com/articles/2015/05/12/russian-chinese-cyber.aspx

NSA chief wary of proxies -- FCW

05/11/2015

“If real cyber norms get established between nations and they include extradition ... key component of the U.S. government’s cyber deterrence strategy: the ability to launch attacks. ... Rewiring the Pentagon: Carter's new cyber strategy

http://fcw.com/articles/2015/05/11/nsa-wary-of-proxies.aspx

Geodata brokers, spear-phishing feds, a Data Act playbook and more -- FCW

05/11/2015

Former NRC employee planned DOE spear-phishing attack ... Prior to the alleged planned attack, the 62-year-old Eccleston had been talking with undercover FBI ... Ashton Carter is set to unveil a new Pentagon cyber strategy in Silicon Valley.

http://fcw.com/articles/2015/05/11/news-in-brief-may-11.aspx

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.