Search

Search results

  1. A Three-Pronged Attack Against Cybersecurity Threats

    ... come from within? According to a recent federal cybersecurity survey conducted by my company, SolarWinds, and Market ... Tags:  insider threat BYOD Cybersecurity ...

    Sandra Jontz - 04/16/2015 - 09:44 - 0 comments

  2. Cybersecurity Education Receives a Makeover

    ... New methods of teaching cybersecurity might be the best hope for providing the necessary security ... grows larger. The demand for well-educated and trained cybersecurity professionals outpaces the supply, both in the government and ...

    Rachel Lilly - 04/01/2015 - 07:51 - 1 comment

  3. Cyber Is NICE Work, If You Can Get it

    ... Cybersecurity is not one of the attractive career fields that tend to draw job ... in the booming digital world. “Building the cybersecurity work force is a critical issue,” says Michael Kaiser, executive ...

    Rachel Lilly - 04/01/2015 - 07:51 - 0 comments

  4. Cybersecurity Information Sharing a Tool for Situational Awareness

    ... Internet Security and Rich Struse with the DHS talk about cybersecurity and information sharing at Homeland Security Conference. Knowing the cybersecurity threat might be half the battle toward mitigating problems, but ...

    Sandra Jontz - 03/10/2015 - 15:39 - 0 comments

  5. NSA Announces Cybersecurity Contest

    ... National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Scientific papers must have been ... the paper must exemplify the performance and reporting of cybersecurity scientific research. The competition was created to stimulate ...

    Maryann Lawlor - 02/24/2015 - 12:01 - 0 comments

  6. GAO: Newer Aircraft Vulnerable to Hacking Through Onboard Wi-Fi

    ... Modern commercial airliners could be at risk of in-flight cybersecurity attacks through a vulnerability posed by passengers using ... System (NexGen) and pointed out in a 56-page report several cybersecurity challenges, including protecting air-traffic control information ...

    Sandra Jontz - 04/15/2015 - 17:00 - 0 comments

  7. Internet of Things Might Pose Even Greater Cybersecurity Risks

    ... March 10, 2015 By Sandra Jontz As if cybersecurity of late has not been tough enough, the emergence of a ubiquitous ... that surprisingly little consideration is being paid to the cybersecurity of this phenomenon,” reads a portion of the report , written ...

    Sandra Jontz - 03/10/2015 - 10:13 - 0 comments

  8. DHS Readies Next Phase of Cybersecurity Conformity

    ... a new thrust in which it addresses a growing concern of cybersecurity: identity management. The program aims to drive the overhaul of ... Diagnostics and Mitigation (CDM) program seeks to fortify cybersecurity of government networks and systems against the trillions of cyber ...

    Rachel Lilly - 03/02/2015 - 09:58 - 0 comments

  9. Government Cybersecurity Research Explores Technological, Human Capabilities

    ... of the emerging Internet of Things, provides its own unique cybersecurity challenges. And, the near future may see individuals making chips ... is cyber. Frincke admits that many different aspects of cybersecurity are important for the agency. Research efforts must take into ...

    Rachel Lilly - 03/02/2015 - 10:03 - 0 comments

  10. Northrop Awarded Cybersecurity Contract Modification

    ... for risk management framework. Contractor will meet cybersecurity requirements using the new Risk Management Framework. Work will ... Acquisition and Contracting Tags:  Cybersecurity Air Force Contract Awards ...

    George Seffers - 02/20/2015 - 16:54

Pages