Search Results


News in Brief: USDS additions, Google dorking, Genachowski's new gig, very real virtual cyber-risks and more -- FCW

08/29/2014

According to the memo, last October, unidentified attackers used Google dorking to find websites running vulnerable versions of a proprietary Internet ... "One of the more recent exploits involves attacks that are designed to wait out the ...

http://fcw.com/articles/2014/08/29/news-in-brief-aug-29.aspx

White House fellows, dire debt predictions and more -- FCW

08/27/2014

... served as special assistant to the senior leadership team that created the U.S. Cyber Command. ... security events and prevent attempted attacks from disrupting agency priorities. ... Researchers work to harden cyber infrastructure from WMD

http://fcw.com/articles/2014/08/27/news-in-brief-august-27.aspx

Cyber Threat Intelligence: How to Leverage Emerging Tools and Tactics -- FCW

08/20/2014

Cyber Threat Intelligence: How to Leverage Emerging Tools and Tactics ... Attackers do not knock on the door and ask permission to enter your enterprise. ... distributed denial-of-service (DDOS) attacks, phishing, malware, zero day exploits, ...

http://fcw.com/webcasts/2014/08/hewlett-packard_importance-of-threat-intelligence_082014.aspx

What it takes to achieve effective cyber defense

08/15/2014

http://fcw.com/articles/2014/08/15/rosiek-effective-cyber-defense.aspx

NIST test bed will probe industrial systems for cyber flaws

08/11/2014

http://fcw.com/articles/2014/08/11/nist-probing-for-cyber-flaws.aspx

NIST test bed will probe industrial systems for cyber flaws -- FCW

08/10/2014

NIST test bed will probe industrial systems for cyber flaws ... identified by the Industrial Control Systems Cyber Emergency Response Team at the ... NIST is trying to get ahead of attackers by developing a simulation system that emulates the ...

http://fcw.com/blogs/the-spec/2014/08/nist-probing-for-cyber-flaws.aspx

What keeps DARPA up at night? -- FCW

08/06/2014

... despite the considerable attention it drew in the wake of the 2001 terrorist attacks. ... Another initiative, the Cyber Grand Challenge, pits hackers against one another in a competition to build software that can protect itself from attack.

http://fcw.com/articles/2014/08/06/what-keeps-darpa-up-at-night.aspx

CyberVor: 1.2 billion stolen logins, but very few answers -- FCW

08/06/2014

... services firms and vendors that serve them to use the Obama administration’s framework document for managing cyber risk for critical infrastructure. ... on the Black Market, using those to attack e-mail providers, social media, and other ...

http://fcw.com/articles/2014/08/06/cybervor-stolen-logins.aspx

Debating the cyber threat -- FCW

07/29/2014

Cybersecurity Debating the cyber threat By Sean Lyngaas ... to cybersecurity, as it did with counterterrorism after the Sept. 11, 2001, attacks? ... The cyber threat "respects borders even less, it moves even more quickly, it involves the ...

http://fcw.com/articles/2014/07/29/debating-the-cyber-threat.aspx

Moving targets, Logan kiosks and industry's view of LPTA -- FCW

07/25/2014

Close this Advertisement ... MTD strategies seek to move cyber defenses from static configurations to a more dynamic set of system parameters that would make it more difficult for attackers to discover and take advantage of vulnerabilities.

http://fcw.com/articles/2014/07/25/news-in-brief-july-25.aspx