Cybersecurity

  • If you use an embedded system of any kind, you could be leaving yourself open to cyber attacks. Learn how to protect yourself!

    May 18, 2010
  • P2P networks a treasure trove of leaked health care data, study finds; DHS contracts immixGroup to support C3

    May 18, 2010
  • Many say for the government to secure their own networks, it must work more closely with the private sector. The Homeland Security Department, and other agencies, are now testing out just how that approach might work. That Department is in the middle of several pilot programs to improve how the government and industry share information related to cyber threats. One goal is to make the sharing of classified information easier, such as an expansion of the post-9/11 Network Fusion Centers used in every state.

    May 17, 2010
  • Cyber criminals know how to steal online funds, but the criminals who know how to convert those funds into cash are now being targeted specifically by the FBI. Agency officials say they\'re targeting - what they call - the \"money mules\" who receive the transfers of stolen funds into their bank accounts. They then make the transaction appear legitimate, sending the money to associates in other countries. The FBI hopes to raise public awareness and dissuade people from becoming mules. The FBI hopes to raise public awareness and dissuade people from becoming mules.

    May 17, 2010
  • A cutting-edge forum addresses public-private partnerships, R&D innovations, and contracting opportunities to protect our country\'s cyber infrastructure. CyberSecurity Seminars CEO Tom Billington has details.

    May 17, 2010
  • GPS glitch hit some military systems in January.

    May 17, 2010
  • Learn more in today\'s cybersecurity update.

    May 14, 2010
  • Facebook rolling out new security features, House panel to consider cybersecurity overhaul

    May 14, 2010
  • The agency is working with different industry sectors to improve how and the kinds of IT security information that flows in both directions. DHS has a pilot with DoD and financial services companies to exchange threat and malicious activity from their networks. DHS also has installed Einstein 2 software on 12 agency networks to improve how they recognize risks.

    May 14, 2010
  • The concept of doing \"even more with even less\" is a step beyond \"doing more with less.\" Lisa Mascolo of Accenture has some ideas for doing it.

    May 13, 2010
  • WFED\'s Jason Miller reports.

    May 13, 2010
  • Learn more in today\'s cybersecurity update.

    May 13, 2010
  • How would the military carry on in the event that an enemy manages to meltdown the DoD\'s digital information infrastructure? We get thoughts from Air Force Major General Kevin Kennedy, Director for Joint Capability Development (J8), U.S. Joint Forces Command.

    May 13, 2010
  • CyberPatriot combines online education and preliminary competition rounds delivered over the internet, proceeding to in-person finals held in conjunction with AFA National Symposia. We get details from Northrop Grumman\'s Diane Miller and the Air Force Association\'s David Buckwalter.

    May 13, 2010

ASK THE CIO

ASK THE CIO

THURSDAYS @ 10 & 2 p.m.

Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.