Obama administration falls short on cybersecurity, CSIS report says
Dr. Terry Gudaitis from Cyveillance joins host John Gilroy to discuss the hidden cyber risks of social media and other common office tools. February 8, 2011
Invited attendees will join the country\'s premiere cyber experts from U.S. Cyber Command, the National Security Agency, Defense Information Systems Agency and Department of Homeland Security plus top cyber intelligence officials, defense and commercial industry leaders from Constellation Energy, Federal Reserve, HP, Johns Hopkins Healthcare System, Lockheed Martin, ManTech, SAIC, TASC, TeleCommunication Systems for an interactive discussion with Maryland educators from K-12, colleges and universities and workforce development organizations.
The Defense Advanced Research Projects Agency is looking for cybersecurity expertise in the most unlikely place: the hacker community.
Jorge Scientific Corporation (Jorge), a leading provider of mission critical services to the Armed Forces and the federal government, has announced that it has acquired FedConcepts — an award-winning IT services and cyber-security provider to the federal government.
Two years ago cybersecurity was not a major issue for public policy. It\'s more so now, but Harry Raduegue says there\'s a long way to go.
Cisco ahs updated its WebEx software to patch two bugs that attackers could exploit to crash or compromise a user\'s system.
From “Dramatic Changes Coming in Endpoint Security” by Jack Gold of J. Gold Associates: There is a significant change coming to endpoint security, with dramatic implications for how end users will be protected and what…
Funding priorities include malware, insider threats, and ways to support the Comprehensive National Cyber Initiative.
\"Detonating\" file copies in a sandbox to examine whether any document contains malicious content stops malware before it can enter your network.
Navy isseus contracts to examine the science, architecture, engineering, functionality, interface and interoperability of cyberspace operations systems, services and capabilities at the tactical, operational and strategic levels.
About half the students graduating with degrees in science and engineering are Chinese and Indians who will eventually return to their countries, according to Rep. Roscoe Bartlett.
A new program will target high school students in the government\'s search for the next generation of cyber warriors. Lawmakers hope the U.S. Cyber Challenge will help attract and train much needed experts in cybersecurity.
Obama administration officials are considering relaxing some security requirements for cloud computing certification to expedite deployments.
As people share more data electronically and boost their use of mobile applications, they\'re becoming more vulnerable to cyberattacks.