Search Results


Fed data at risk in attacks on university computers -- FCW

01/27/2015

Fed data at risk in attacks on university computers ... Cyber attackers hijacked a university's supercomputer in early 2014, leveraging its vast capabilities in a massive ... The attack used about 98 percent of the university’s bandwidth.

http://fcw.com/articles/2015/01/27/fed-data-at-risk.aspx

GSA cloud, Marine Corps guidance and a UK cyber deal -- FCW

01/27/2015

GSA cloud, Marine Corps guidance and a UK cyber deal ... "Understanding and seizing opportunities in the cyber domain while meeting the associated challenges ... "Every day, determined adversaries attack and seek to compromise Marine Corps ...

http://fcw.com/articles/2015/01/27/news-in-brief-january-27.aspx

U.S. intelligence challenged by technology, cyber -- FCW

01/21/2015

Tweet ... of Defense Michael Vickers said cyber threats are "increasing in frequency, scale, ... "The range of threat actors, the methods of attack, the targeted systems and the victims who suffer from these attacks have also been expanding."

http://fcw.com/articles/2015/01/21/us-intel-challenged-by-cyber.aspx

Pentagon oversight, cyber sharing, a DISA departure and a SOTU preview -- FCW

01/20/2015

Close this Advertisement ... Tweet ... Pentagon oversight, cyber sharing, a DISA departure and a SOTU preview ... Obama, Cameron agree to cyber defense, academic exchanges ... Report: US hack of North Korea provided proof in Sony attack

http://fcw.com/articles/2015/01/20/news-in-brief-january-20.aspx

The State of the Union's IT issues -- FCW

01/20/2015

... better meet the evolving threat of cyber-attacks, combat identity theft, and protect our ... While such a cyber bill has long proved elusive under a divided Congress, the path ... Report: US hack of North Korea provided proof in Sony attack

http://fcw.com/articles/2015/01/20/tech-gets-a-rare-shout-out.aspx

How to catch the attacker with valid user credentials -- FCW

01/08/2015

... a common occurrence, and well-funded nation states are taking a major interest in cyber espionage activities. ... In 2012, Mandiant’s M-Trends report showed that attackers used valid employee credentials in 100 percent of targeted attacks.

http://fcw.com/articles/2015/01/08/how-to-catch-the-attacker.aspx

The FBI, North Korea and the future of cyber investigations -- FCW

01/08/2015

The FBI, North Korea and the future of cyber investigations ... Attribution in cyberattacks is an immensely difficult thing, he said. "The advantage is to the attacker. There are so many ways ... Congress moves cyber-hiring, FISMA measures

http://fcw.com/articles/2015/01/08/fbi-versus-north-korea.aspx

FBI wants cyber sleuths with some muscle

01/05/2015

http://fcw.com/articles/2015/01/05/fbi-cyber-sleuths.aspx

How IARPA hopes to get ahead of cyberattacks -- FCW

12/29/2014

... . 21 Proposers' Day for the Cyber-attack Automated Unconventional Sensor Environment ( ... Program to explore options beyond the typical "postmortem analysis" approaches to cyber defense that focus on the attack vectors used by adversaries.

http://fcw.com/blogs/the-spec/2014/12/spec-iarpa-cyber-proactive.aspx

Sober about cyber -- FCW

12/22/2014

Blog archive Sober about cyber In the middle of a fairly lighthearted, jovial holiday party in Boston, I got into a ... him how worried he was about possible North Korean attacks on U.S. infrastructure more critical than Sony Entertainment’s ...

http://fcw.com/blogs/lectern/2014/12/kelman-sober-cyber.aspx

Operation Jump Start

FCW is proud to support this Feb. 9 event to help the soldiers of Operation Iraqi Freedom and Operation Enduring Freedom transition to civilian careers.