Search Results


Cyber worker shortage hurting operations -- FCW

07/27/2016

"Cyber adversaries have no lawyers, no rules [and] plenty of money," she said at the event CSIS held on July 27 to release the study. ... cybersecurity areas, including intrusion detection, secure software development and attack mitigation.

http://fcw.com/articles/2016/07/27/cyber-workforce-study.aspx

CTIIC chief: We're up and running -- FCW

07/22/2016

The Cyber Threat Intelligence Integration Center came out of a simple idea: As with terrorism, the intelligence community needs to produce a holistic, ... a function of the information available on the attack and the level of confidence the ...

http://fcw.com/articles/2016/07/22/ctiic-cyber-running.aspx

Are U.S. chemical plants ready for cyberattacks? -- FCW

07/21/2016

... if you're protected" against a coordinated cyber assault like the one that happened in ... The attack, which hit regional electricity distribution companies, left more than a ... Turkish hackers claim credit for Library of Congress attack

http://fcw.com/articles/2016/07/21/dhs-cyber-chemical.aspx

Turkish hackers claim credit for Library of Congress attack -- FCW

07/20/2016

Tweet ... The attack was launched July 17, in the midst of Turkey's response to the military coup targeting the elected ... Thrift Savings Plan Share Prices DARPA’s all-machine cyber challenge Putting the NIST Cyber Security Framework to work

http://fcw.com/articles/2016/07/20/loc-hack-turkish-group.aspx

Library of Congress wracked by DNS attack -- FCW

07/18/2016

... of Congress was the target of a denial-of-service attack that has knocked out Congress.gov and the U.S ... was no information on the source of the attack, which comes just a few days after ... How military strategy can improve cyber response

http://fcw.com/articles/2016/07/18/loc-cyber-attack.aspx

How military strategy can improve cyber response -- FCW

07/18/2016

How military strategy can improve cyber response ... readiness planning to structure their responses to cyber incidents so they can mitigate risks and ... agency's ability to effectively recover from an attack takes preparation and practice.

http://fcw.com/articles/2016/07/18/golden-cyber-prepare.aspx

Tighe takes over naval intel, info warfare -- FCW

07/18/2016

The Navy has a new top spy and cyber official. ... She's served as commander, U.S. Fleet Cyber Command and U.S. Cyber Command deputy. ... New from FCW Library of Congress wracked by DNS attack Watchdog: DOD's infrastructure push needs scope

http://fcw.com/blogs/fcw-insider/2016/07/tighe-naval-cyber-intel.aspx

Financial regulator details growing risks for banking systems -- FCW

07/14/2016

Cyber criminals, it said, typically use phishing attacks on bank employees, customers or ... More insidiously, it noted cyber attackers have continued to target companies that provide cybersecurity risk-mitigation products and services to ...

http://fcw.com/articles/2016/07/14/occ-treasury-cyber.aspx

HHS issues ransomware guidance -- FCW

07/12/2016

Typically in the event of a cyber breach, health providers are required to notify ... But ransomware attacks are different from other kinds of breaches, and the notification rules have not ... DHS pushes for more cyber experts in the field

http://fcw.com/articles/2016/07/12/hhs-ransomware-guidance.aspx

Army seeks to use cyber at tactical level -- FCW

07/05/2016

... the future and could have a ripple effect on the joint cyber force led by U.S. Cyber Command. ... tasked with defending against and conducting attacks on those networks to gain a ... Vermont’s disaster prep exercise includes cyber response

http://fcw.com/articles/2016/07/05/army-cyber-tactical.aspx

FCW in Print

In the latest issue: grid security, agile development, BYOD and more!

More from 1105 Public Sector Media Group