With the increased attack surface created by remote work, it’s never been more critical that organizations revisit their cyber policies and the training they offer to employees.
Hosted by Dr. Richard Shurtz and Jim Russ. Sponsored by Stratford University. Tips on how to avoid phishing scams and we meet the Dutch computer programmer who is best known as the author of the “Python” programming language.
In today’s Federal Newscast, the cybersecurity firm Anomali Labs says it’s found a malicious server hosting two separate phishing campaigns targeting government contractors looking to do business with the Labor and Transportation departments.
The Intelligence Advanced Research Projects Agency (IARPA) will release the details of its Virtuous User Environment (VirtUE) program that secures each employee role in separate cloud containers.
Russian cyber experts appear to be omni-hackers; they’re willing to target both Republicans and Democrats. Conservative think tanks are the latest targets.
For this month’s show, Cyber Chat’s host Sean Kelley sat down with a reflective Scott Blackburn. Blackburn served in many capacities while at the Veterans Affairs Department.
Pam Holland, founder of Tech Moxie, talks about her company’s efforts to teach people to use technology safely and effectively. Holland also explains how online scams like phishing can be so dangerous–and so convincing.
The Domain-Based Message Authentication, Reporting and Conformance standard (DMARC) is designed to lower the risk of phishing attacks.
Bill Evanina, the director of the National Counterintelligence and Security Center and the National Counterintelligence Executive, said foreign hackers will target current and former federal employees based on a broad set of data, not just personal information stolen during the massive breach in 2015.
A phenomenon called the “cyber caliphate” is producing ever-rising levels of cyber-attacks and real-world violence. ICIT’s James Scott has advice for how agencies can defend against and attack cyber-jihadists.