Search Results


FBI uses malware to ID North Korea as Sony culprit -- FCW

12/19/2014

... of the data deletion malware used in this attack revealed links to other malware that ... was also "significant overlap" in the infrastructure used in the attack on Sony and "other malicious cyber activity" the U.S. government has previously ...

http://fcw.com/articles/2014/12/19/fbi-blames-sony-on-north-korea.aspx

FEMA contract, Secret Service tech and more NDAA provisions -- FCW

12/19/2014

... , a new Department of Homeland Security report recommends the service get dedicated funding to develop and obtain cutting-edge technologies to ensure tech superiority over would-be attackers. ... Congress moves cyber-hiring, FISMA measures

http://fcw.com/articles/2014/12/19/news-in-brief-dec-19.aspx

Managing a cyber crime scene

12/18/2014

http://fcw.com/articles/2014/12/18/managing-a-cyber-crime-scene.aspx

Outgoing Intelligence chairman warns of cyber vulnerabilities

12/15/2014

http://fcw.com/articles/2014/12/15/chairmans-warns-of-cyber.aspx

Why the Sony hack should scare feds -- FCW

12/12/2014

The attack by a group that calls itself "Guardians of Peace" marks a shift by cyber attackers to a more destructive path, Bell told FCW. Traditionally, attackers have focused primarily on monetizing stolen credit card and personal information ...

http://fcw.com/articles/2014/12/12/why-the-sony-hack-should-scare-feds.aspx

SQL Injection Defense: There are no Silver Bullets -- FCW

12/08/2014

SQL injection consistently ranks among the most popular cyber attack techniques. ... For nearly two decades cyber criminals have breached databases using SQL injection to steal intellectual property, to access personal information, and for ...

http://fcw.com/whitepapers/2014/12/db-networks-sql-injection-defense-120814.aspx

Burning down the legacy SOC -- FCW

12/08/2014

But when attacks look like legitimate traffic, how can common tools identify patterns? ... into the federal government. Postal Service reveals cyber breach The September attack, made public Nov. 10, potentially puts customer and employee ...

http://fcw.com/articles/2014/12/08/nguyen-burning-down-the-legacy-soc.aspx

Treasury nominee, spectrum sharing, cyber dialogue and more -- FCW

12/05/2014

... , including cyber defenses. Obama knocks China on cyber theft President Obama said on ... into the federal government. Postal Service reveals cyber breach The September attack, made public Nov. 10, potentially puts customer and employee ...

http://fcw.com/articles/2014/12/05/briefs-for-dec-5-2014.aspx

Cyber justice, (ISC)2 shuffle and Nuix deal -- FCW

12/04/2014

Dec 04, 2014 Justice launching new cyber unit The Justice Department is responding to ... into the federal government. Postal Service reveals cyber breach The September attack, made public Nov. 10, potentially puts customer and employee ...

http://fcw.com/articles/2014/12/04/news-in-brief-december-4.aspx

Cybersecurity's Maginot Line: A Real-World Assessment of the Defense-in-Depth Model -- FCW

12/01/2014

Like the Maginot Line, today’s cyber defenses are fast becoming a relic in today’s threat landscape. ... But attackers are easily outflanking these defenses with clever, fast-moving attacks. ... Key findings include: ... Sponsored By FireEye

http://fcw.com/whitepapers/2014/12/fireeye-cybersecurity-maginot-line-120114.aspx

Who's Fed 100-worthy?

Nominations are now open for the 2015 Federal 100 awards. Get the details and submit your picks!