Search Results


Debating the cyber threat -- FCW

07/29/2014

Cybersecurity Debating the cyber threat By Sean Lyngaas ... to cybersecurity, as it did with counterterrorism after the Sept. 11, 2001, attacks? ... The cyber threat "respects borders even less, it moves even more quickly, it involves the ...

http://fcw.com/articles/2014/07/29/debating-the-cyber-threat.aspx

Moving targets, Logan kiosks and industry's view of LPTA -- FCW

07/25/2014

Close this Advertisement ... MTD strategies seek to move cyber defenses from static configurations to a more dynamic set of system parameters that would make it more difficult for attackers to discover and take advantage of vulnerabilities.

http://fcw.com/articles/2014/07/25/news-in-brief-july-25.aspx

'History may be repeating itself' in cyberspace -- FCW

07/22/2014

... leading up to the Sept. 11 terrorist attacks, the 9/11 Commission has warned of ... pass legislation that encourages private firms and federal officials to share cyber-threat information while protecting those firms from liability for doing ...

http://fcw.com/articles/2014/07/22/commission-to-washington.aspx

Airport security, health IT, cyber-collaboration and more -- FCW

07/21/2014

Airport security, health IT, cyber-collaboration and more ... that tested inter-agency responses to an attack on critical infrastructure networks. ... and FBI's responses to foreign attacks on simulated critical infrastructure networks, the ...

http://fcw.com/articles/2014/07/21/news-in-brief-july-21.aspx

Northern Command nominee: U.S. behind in cyber defense -- FCW

07/18/2014

Northern Command nominee: U.S. behind in cyber defense ... By Sean Lyngaas ... U.S. Cyber Command takes the lead in the nation's cyber-defense, but Northern Command would coordinate with Cyber Command in the event of an attack, he said.

http://fcw.com/articles/2014/07/18/northern-command-nominee.aspx

Treasury Secretary warns of cyber threats to financial sector -- FCW

07/16/2014

Treasury Secretary warns of cyber threats to financial sector ... And successful attacks on our financial system would compromise market confidence, ... responsible for protecting themselves against cyber threats, but government can help by ...

http://fcw.com/articles/2014/07/16/treasury-warning-on-cyber.aspx

Critical infrastructure under attack -- and unprepared -- FCW

07/14/2014

Critical infrastructure under attack -- and unprepared ... Security's Industrial Control Systems Cyber Emergency Response Team posted warnings ... Fifty- seven percent of respondents agree that cyber threats are putting industrial control ...

http://fcw.com/articles/2014/07/14/infrastructure-under-attack.aspx

No thawing of cyber tensions on Kerry’s Beijing trip -- FCW

07/11/2014

No thawing of cyber tensions on Kerry’s Beijing trip ... the Justice Department indicted five Chinese military officers on charges of cyber-espionage. ... “The loss of intellectual property through cyber has a chilling effect on innovation ...

http://fcw.com/articles/2014/07/11/us-china-cybersecurity.aspx

A few comments regarding reader comments -- FCW

07/09/2014

... threads are filled with spam, trolls and off-topic attacks, FCW's commenters consistently show themselves to ... , you can't express it here. Personal attacks. Many FCW stories focus on specific ... NSA's Rogers: JIE crucial to cyber defense

http://fcw.com/blogs/conversation/2014/07/comment-moderation.aspx

Isolate and conquer: Getting past a reliance on layered security -- FCW

07/09/2014

... the ugly truth: 71 percent of attacks start at endpoint devices because humans are ... security can be uniformly defeated by attacks that exploit vulnerabilities deep within device operating ... NSA's Rogers: JIE crucial to cyber defense

http://fcw.com/articles/2014/07/09/crosby--micro-virtualization.aspx