Search Results


Report: Pawn Storm a growing cyber threat -- FCW

04/25/2017

... phishing, spear-phishing, watering hole attacks, tabnabbing (a technique that spoofs ... General: Cyber Command needs new platform before NSA split ... U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the ...

http://fcw.com/articles/2017/04/25/critical-trendmicro-pawn-storm.aspx

The Fed should do more to oversee financial sector cyber -- FCW

04/24/2017

The Fed should do more to oversee financial sector cyber ... should be preparing to counter "significant cybersecurity attacks," the OIG warned. ... the need for greater continuity in cyber operations, identifying opportunities to improve ...

http://fcw.com/articles/2017/04/24/fed-oversight-financial-cyber.aspx

Cyber challenges demand trained young leaders -- FCW

04/21/2017

The attackers temporarily -- and reversibly -- damaged some systems from each school ... As cyber attacks become increasingly more complex, we must remain vigilant and committed ... General: Cyber Command needs new platform before NSA split

http://fcw.com/articles/2017/04/21/cdx-ransom-cyber-comment.aspx

DHS Secretary cryptic on cyber -- FCW

04/18/2017

Nation states, cyber criminals, lone wolves and cyber terrorists are carrying out attacks for a host of different reasons, the secretary said. ... U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head ...

http://fcw.com/articles/2017/04/18/dhs-kelly-gwu-speech.aspx

Securing the government cloud -- FCW

04/17/2017

... steps to prevent, detect and respond to cyber adversaries during the attack lifecycle. ... General: Cyber Command needs new platform before NSA split ... U.S. Cyber Command should be elevated to a full combatant command as soon as possible, ...

http://fcw.com/articles/2017/04/17/securing-government-cloud-howard.aspx

Federal Data is under Attack! -- FCW

04/14/2017

Federal Data is under Attack! U.S. Federal agency data is a #1 target for the most sophisticated and highest funded ... The speaker will talk about protection from insider threat, how to increase security ... The JavaScript is not enabled!

http://fcw.com/webcasts/2017/04/thales-federal-data-042717.aspx

How government can securely move IT systems to the cloud -- FCW

04/14/2017

With security breaches on the rise, an attack can occur anywhere and at any time. ... General: Cyber Command needs new platform before NSA split ... U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the ...

http://fcw.com/articles/2017/04/14/comment-it-cloud-johnson.aspx

Student cyber teams do battle -- FCW

04/12/2017

Cybersecurity Student cyber teams do battle By Sean D. Carberry ... , are feverishly typing away launching a variety of attacks on the student networks. ... U.S. Cyber Command should be elevated to a full combatant command as soon as possible ...

http://fcw.com/articles/2017/04/12/student-cyber-teams-do-battle.aspx

OIG: USPS not prepared for IT blackout -- FCW

04/07/2017

... , whether they're due to tech failures, cyber attacks or natural causes, such as rain, ... General: Cyber Command needs new platform before NSA split ... U.S. Cyber Command should be elevated to a full combatant command as soon as possible, ...

http://fcw.com/articles/2017/04/07/usps-it-blackout-gunter.aspx

WikiLeaks exposes more alleged CIA cyber tools -- FCW

04/03/2017

WikiLeaks exposes more alleged CIA cyber tools ... chapter in its ongoing "Vault 7" series of cyber and hacking tools allegedly poached from the CIA. ... “forensic investigators attribute previous hacking attacks and viruses to the CIA.

http://fcw.com/articles/2017/04/03/wikileaks-cyber-cia-more.aspx

The Fed 100

Read the profiles of all this year's winners.

More from 1105 Public Sector Media Group