Search Results


Beyond the Cyber Sprint: An Enterprise Approach to User Authentication -- FCW

09/16/2015

For years, cyber experts have warned that user authentication often is the weakest link in an organization’s cybersecurity ... A continuing reliance on the password, which is easily compromised by even the most rudimentary cyber-attacks.

http://fcw.com/webcasts/2015/09/symantec-user-authentication-webcast-091615.aspx

FirstNet woos potential bidders -- FCW

08/28/2015

... push for the network came in the wake of the 2001 terrorist attacks, during which first responders from different agencies and jurisdictions were unable ... Legal Matters: Agencies attack feds who make IT systems vulnerable to cyber attacks

http://fcw.com/articles/2015/08/28/firstnet-woos-potential-bidders.aspx

Shielding innovation from DOD bureaucracy, mapping feds' local impact and more -- FCW

08/28/2015

News in Brief ... Each project will investigate how cyber-physical systems can be secured as the Internet of Things becomes more pervasive in society. ... Legal Matters: Agencies attack feds who make IT systems vulnerable to cyber attacks

http://fcw.com/articles/2015/08/28/news-in-brief-aug28.aspx

Prioritizing authentication, GitHub attacked, Carter back to Silicon Valley and more

08/25/2015

http://fcw.com/articles/2015/08/25/news-in-brief-august-25.aspx

Unified Approach to Cybersecurity Decreases Chances of Error -- FCW

08/21/2015

The Federal Government is a prime target for cyber-attacks. ... This digital dialogue covers the key points of the 3 part webcast covering cybersecurity and protecting sensitive information from hackers and cyber attacks. ... Agencies

http://fcw.com/whitepapers/2015/08/dlt-forescout-symantec-unified-approach-to-cybersecurity-082115.aspx

Chaffetz wants answers from US-CERT, OPM on hack -- FCW

08/20/2015

... or analysis on the nature of the attack, including whether hackers deployed any ... was enmeshed in ongoing, but below-the-line cyber wars with China, Russia, Iran and North Korea, and that federal agencies are vulnerable targets for attack.

http://fcw.com/articles/2015/08/20/chaffetz-uscert.aspx

OPM: CDM will offer baseline security -- FCW

08/19/2015

... “access control” – a loss of credentials via a contractor – was a key to the attack. ... be to hunt for risky behavior, from sophisticated threats to sloppy cyber hygiene. ... Central Command looks for private sector for joint cyber planning

http://fcw.com/articles/2015/08/19/cdm-for-opm.aspx

OMB releases cyber guidance for contractors -- FCW

08/11/2015

OMB releases cyber guidance for contractors ... Hackers have exploited contractors’ cyber vulnerabilities in some of the biggest attacks on federal networks, including a pair of breaches of ... NIST identifies objectives for cyber standards

http://fcw.com/articles/2015/08/11/omb-cyber-guidance.aspx

Another cyber bill, a FedRAMP report card, cyber-ed partnerships and more -- FCW

08/06/2015

Another cyber bill, a FedRAMP report card, cyber-ed partnerships and more ... NSA, South Dakota State partner on cyber education ... security tool "in an effort to severely impact an attacker's ability to operate in existing and future mobile ...

http://fcw.com/articles/2015/08/06/news-in-brief-august-6.aspx

VA launches cyber squad -- FCW

08/04/2015

Tweet ... Veterans Affairs VA launches cyber squad By Adam Mazmanian ... None of the potential data loss incidents were the result of cyber attacks, according to the VA report. ... Report: Attacks will happen, so reduce the time to detection

http://fcw.com/articles/2015/08/04/va-cyber-squad.aspx

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.