Search Results

Cyber Risk Report 2015: Executive Summary -- FCW


Cyber Risk Report 2015: Executive Summary May 28, 2015 ... of HP’s annual security research Cyber Risk Report details a threat landscape still ... environment is one in which well-known attacks and misconfigurations exist side-by-side with ...

Mobile Security: Confidence Ebbs as BYOD Booms -- FCW


Security risks have grown roughly in proportion to the meteoric growth in employee- ... Meanwhile cyber-attacks are growing in sophistication and severity. ... According to data from a new IDG Research survey, these dynamics have IT decision ...

Cracking down on poor cyber hygiene -- FCW


Defense Cracking down on poor cyber hygiene By Sean Lyngaas ... a more data-rich template for assessing “cyber hygiene” – the prevalence of basic ... a memo warning about potential phishing attacks on defense personnel through third-party ...

House panel moves drone, FOIA, IT dupe bills -- FCW


... how small and medium-sized unmanned aerial systems could be used in an attack, as well as how to prevent or mitigate the effects of such an attack. ... Committee and is a member of the Cyber Security Caucus, said emerging small drone ...

State Department presents cyber norms to Congress -- FCW


... in the hearing said he was “greatly concerned” by reports that China had attacked U.S. websites using a unique cyber weapon known as the “Great Cannon.” ... cyber incidents; should not conduct cyber-enabled intellectual property theft; and ...

SAP NS2 Real-Time Cyber Situational Awareness -- FCW


SAP NS2 Real-Time Cyber Situational Awareness ... designed for a traditional network and traditional attack patterns are no longer sufficient, as they cannot ... a greater anticipatory intelligence and more rapid resolution of cyber threats.

When shared services go bad -- FCW


Tweet ... Cyber criminals are increasingly collaborating on malware and attacks, John Riggi, section chief for cyber division outreach at the FBI, said during a presentation at the ISC2's Cyber Secure Gov conference on May 14 in Washington.

Debating the Sino-Russian cyber pact -- FCW


Cybersecurity Debating the Sino-Russian cyber pact By Sean Lyngaas ... “You have both of these huge cyber resources now cooperating, which means . ... makes the threat of a disruptive digital attack in retaliation for Western sanctions a real ...

NSA chief wary of proxies -- FCW


“If real cyber norms get established between nations and they include extradition ... key component of the U.S. government’s cyber deterrence strategy: the ability to launch attacks. ... Rewiring the Pentagon: Carter's new cyber strategy

Geodata brokers, spear-phishing feds, a Data Act playbook and more -- FCW


Former NRC employee planned DOE spear-phishing attack ... Prior to the alleged planned attack, the 62-year-old Eccleston had been talking with undercover FBI ... Ashton Carter is set to unveil a new Pentagon cyber strategy in Silicon Valley.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.