Search Results


Will new commercial mobile encryption affect BYOD policy? -- FCW

10/20/2014

... only to the users who set them, and can't be cracked using garden-variety cryptographic attacks. ... warned that the most advanced, persistent cyber adversaries will find a way through ... In search of cyber pros (and other IT rock stars)

http://fcw.com/articles/2014/10/20/mobile-encryption-and-federal-byod-policy.aspx

POODLE's bark may be worse than its bite -- FCW

10/20/2014

It can be used by remote attackers to decrypt and extract information from inside an encrypted ... In search of cyber pros (and other IT rock stars) ... Feds: Cyber resiliency in financial services comes from public-private cooperation

http://fcw.com/articles/2014/10/20/poodles-bark-and-bite.aspx

GPO cloud, Army IT, cyber insurance and more -- FCW

10/07/2014

GPO cloud, Army IT, cyber insurance and more ... "[Electronic warfare] and cyber have to come together because cyber alone can't knock the door down," ... involves jamming or infiltrating adversarial systems using spectrum-based attacks.

http://fcw.com/articles/2014/10/07/news-in-brief-oct-7.aspx

More SEWP V vendors, DOD cloud pilots, NSF data projects and more -- FCW

10/02/2014

... happens when a mission critical data center is subjected to a cyber or physical attack that requires moving the application to another hosting site? ... ," Irene Qualters, division director for Advanced Cyber infrastructure at NSF, said in a ...

http://fcw.com/articles/2014/10/02/news-in-brief-october-2.aspx

DARPA seeks ideas on cyber vulnerabilities and recoveries -- FCW

10/01/2014

DARPA seeks ideas on cyber vulnerabilities and recoveries ... WHY: Cyber criminals enjoy a target rich environment (pun intended), but the Defense ... systems with a $52 million solicitation for Cyber Fault-Tolerant Attack Recovery (CFAR).

http://fcw.com/blogs/the-spec/2014/10/darpa-seeks-ideas-on-cyber.aspx

Intel chairman: We need more cyber offense -- FCW

10/01/2014

Intel chairman: We need more cyber offense ... .) is reviving a dialogue between Congress and Cyber Command on the role of offense in U.S. cyber policy. ... law-enforcement agencies must agree on attack protocols in the event Washington goes ...

http://fcw.com/articles/2014/10/01/intel-chairman-on-cyber.aspx

Net control, IS attacks, PC prices and more -- FCW

09/30/2014

Close this Advertisement ... News in Brief ... Net control, IS attacks, PC prices and more ... An attack on the system could disrupt communications and expose law enforcement's requests to the system to criminals or other adversaries.

http://fcw.com/articles/2014/09/30/news-in-brief-sept-30.aspx

Cybersecurity: Continuous Diagnostics and Mitigation -- FCW

09/24/2014

Cyber attacks on government networks are becoming more frequent and sophisticated, underscoring the importance of fortifying cyber defenses to protect agency data and applications. ... Download this executive summary to learn more. ... Policy

http://fcw.com/whitepapers/2014/09/face-to-face-cybersecurity-092414.aspx

ISIS cyber capability judged more 'aspirational' than operational -- FCW

09/17/2014

ISIS cyber capability judged more 'aspirational' than operational ... a "digital caliphate" for launching attacks on U.S. critical infrastructure. ... Cole said he hopes Cyber Command attacks ISIS online because it would be an important ...

http://fcw.com/articles/2014/09/17/isis-cyber-capability.aspx

OPM terminating USIS background-check contract -- FCW

09/10/2014

Close this Advertisement ... "all the markings of a state-sponsored attack," and maintained that it should not be punished for having "self-detected this cyber-attack and reported it immediately to OPM, to other government agencies and to ...

http://fcw.com/articles/2014/09/10/opm-fires-usis.aspx