"We saw for the very first time a cyber attack that brought down critical infrastructure upon which ... phishing, could be solved by basic cyber hygiene, and quickly resolved by being prepared for the "what if" in the event of a cyber attack.
But with cyber, "we go out and collect more threat intelligence." ... That's not an approach that will stop attackers who are constantly changing methods, or ... tried-and-true malware and other attacks to exploit flawed systems, Ross said.
... such as the IRS' Get Transcript attack, wherein scammers took sensitive taxpayer ... importance of phishing emails in public sector attacks is especially telling. ... A year after the OPM breach, one cyber vendor is still looking for answers
... by the growing scourge of ransomware attacks and hacktivists intent on stopping ... DAPRA seeks plans for tackling malicious cyber campaigns Halvorsen: Cyber war is a culture war US cyber officials worry 'milware' will target infrastructure
Tweet ... makes clear that the service's cyber operatives are expected to keep networks running in the face of hacking attacks. ... policies for defensive and offensive cyber operations, and with integrating intelligence and cyber operations.
Marines take prominent role in DOD cyber operations ... Marine Corps' cyber operatives have been at the forefront of two of the U.S. military's most ... "That was probably the first real attack that we had.a finished CPT really get after," ...
NSA cyber exercise hones skills at military academies ... expose the future Defense Department cyber workforce to intrusion techniques they'll ... part of the red team of computer specialists who attacked networks set up and defended by the ...
... between privacy and protection in the wake of recent terrorist attacks in Paris and Brussels. ... from boarding planes and help Europe prevent attacks against aviation targets. ... NSA cyber exercise hones skills at military academies
Open Source DHS warns on cyber risks of open source By Sean Lyngaas ... their source code because it allows attackers to "construct highly targeted attacks against the software" or "build-in ... IRS systems still vulnerable to cyber criminals
Tweet ... Act that requires DOD to develop a strategy for Cyber Command to assist civil authorities in response to potential cyber attacks from foreign nation-states by May 2016. ... DOD lacks clear chain of command for domestic cyber attacks
Check out the digital edition of FCW magazine -- the federal IT community's premier publication.
In this issue: Profiles of every Fed 100 winner, the government and industry Eagle Award winners and more.
See the latest issue
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com