Former intelligence CIO Dale Meyerrose discusses the top cyber stories of the year.
Dec. 14th, 10:00 am Cyber-threats have created unprecedented technical and social challenges that have never before been addressed. In the past, when the enemy attacked you could see it, touch it and know what damage was incurred. A cyber-bullet can attack a country, a financial institution, or a power grid and we may not be able to detect or ever know or understand the full impact of the security breach. What are the issues that the public is facing due to cyber-threats? What progress is being made in regards to cyber-security? Join us for a discussion with experts in the field of CyberSecurity to learn about this tough subject and what we need to do to stay vigilant against cyber threats and attacks.
Center for Internet Security\'s Steve Piliero discusses his group\'s study on cybersecurity metrics.
Even worse, they\'re getting more sophisticated too.
Computer software targeted by Stuxnet is used in US infrastructure but the virus does not appear to have affected any systems in the United States, a US cybersecurity official said Tuesday.
The agencies sign a MOU to work more closely on research and development on new technologies to protect the financial services sector\'s critical infrastructure. This agreement follows a pilot DHS and DoD have been working on to share threat information.
\"We want to protect the end user and we don\'t want them to care if it was antivirus or personal firewall; you want to protect them in a broader scheme,\" says ISCA Labs.
Demand for vendor-furnished information security products and services by the U.S. federal government will increase from $8.6 billion in 2010 to $13.3 billion in 2015 at a compound annual growth rate (CAGR) of 9.1%. INPUT\'s John Slye explains why.
IBM has a new tool to spot security vulnerabilities even while they\'re being written.
\"I\'ve actually extended the time for industry to comment to Jan. 17,\" said federal CIO Vivek Kundra.
The federal CIO Vivek Kundra will roll out specifics about the administration\'s plan to change the way agencies buy and manage technology. The administration wants to give CIOs more authority over the budget for commodity IT such as e-mail or infrastructure. Kundra also said 2012 budget request will include requirements for continuous monitoring of agency networks.
Naba Barkakati, GAO\'s Chief Technologist, shares how agencies can secure their wireless networks.
Randy Vickers, head of U.S. CERT, discusses cybersecurity challenges in the government. December 2, 2010
Increased reliance on the internet, networked systems, and connectivity creates opportunities for cyber attackers to disrupt government operations, as well as U.S. critical infrastructure.
Hackers have unleashed a new pair of schemes that demand ransom for access to your files.