Search Results


Cyber Threat Intelligence: How to Leverage Emerging Tools and Tactics -- FCW

08/20/2014

Cyber Threat Intelligence: How to Leverage Emerging Tools and Tactics ... Attackers do not knock on the door and ask permission to enter your enterprise. ... distributed denial-of-service (DDOS) attacks, phishing, malware, zero day exploits, ...

http://fcw.com/webcasts/2014/08/hewlett-packard_importance-of-threat-intelligence_082014.aspx

What it takes to achieve effective cyber defense

08/15/2014

http://fcw.com/articles/2014/08/15/rosiek-effective-cyber-defense.aspx

NIST test bed will probe industrial systems for cyber flaws

08/11/2014

http://fcw.com/articles/2014/08/11/nist-probing-for-cyber-flaws.aspx

NIST test bed will probe industrial systems for cyber flaws -- FCW

08/10/2014

NIST test bed will probe industrial systems for cyber flaws ... identified by the Industrial Control Systems Cyber Emergency Response Team at the ... NIST is trying to get ahead of attackers by developing a simulation system that emulates the ...

http://fcw.com/blogs/the-spec/2014/08/nist-probing-for-cyber-flaws.aspx

What keeps DARPA up at night? -- FCW

08/06/2014

... despite the considerable attention it drew in the wake of the 2001 terrorist attacks. ... Another initiative, the Cyber Grand Challenge, pits hackers against one another in a competition to build software that can protect itself from attack.

http://fcw.com/articles/2014/08/06/what-keeps-darpa-up-at-night.aspx

CyberVor: 1.2 billion stolen logins, but very few answers -- FCW

08/06/2014

... services firms and vendors that serve them to use the Obama administration’s framework document for managing cyber risk for critical infrastructure. ... on the Black Market, using those to attack e-mail providers, social media, and other ...

http://fcw.com/articles/2014/08/06/cybervor-stolen-logins.aspx

Debating the cyber threat -- FCW

07/29/2014

Cybersecurity Debating the cyber threat By Sean Lyngaas ... to cybersecurity, as it did with counterterrorism after the Sept. 11, 2001, attacks? ... The cyber threat "respects borders even less, it moves even more quickly, it involves the ...

http://fcw.com/articles/2014/07/29/debating-the-cyber-threat.aspx

Moving targets, Logan kiosks and industry's view of LPTA -- FCW

07/25/2014

Close this Advertisement ... MTD strategies seek to move cyber defenses from static configurations to a more dynamic set of system parameters that would make it more difficult for attackers to discover and take advantage of vulnerabilities.

http://fcw.com/articles/2014/07/25/news-in-brief-july-25.aspx

'History may be repeating itself' in cyberspace -- FCW

07/22/2014

... leading up to the Sept. 11 terrorist attacks, the 9/11 Commission has warned of ... pass legislation that encourages private firms and federal officials to share cyber-threat information while protecting those firms from liability for doing ...

http://fcw.com/articles/2014/07/22/commission-to-washington.aspx

Airport security, health IT, cyber-collaboration and more -- FCW

07/21/2014

Airport security, health IT, cyber-collaboration and more ... that tested inter-agency responses to an attack on critical infrastructure networks. ... and FBI's responses to foreign attacks on simulated critical infrastructure networks, the ...

http://fcw.com/articles/2014/07/21/news-in-brief-july-21.aspx