Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Cyber

Ramping Up the
 Federal Cloud Against the Insider Threat

October 1, 2014
By George I. Seffers

The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.

NSA Benefits Outweigh Snowden Damage

August 28, 2014
By George I. Seffers

Revelations about the NSA's monitoring practices created some fallout with the telecommunications industry and other nations, acknowledges Adm. Michael Rogers, USN, the agency’s new director. But the capabilities the agency provides eclipse the damage done.

Sponsor Blog: Riverbed Federal Offers Rapid and Easy Solutions to Counter Cybersecurity Challenges

August 25, 2014
This article is written by our sponsor Riverbed Federal. - See more at: http://www.afcea.org/content/?q=node/13370#sthash.xU7eWo3D.dpuf

This article is written by our sponsor Riverbed Federal. Federal agencies are always looking for ways to spend their security dollars more efficiently. Cyber Attack Defenders recently sat down with Sean Applegate, director of technology strategy at Riverbed Federal, who provided some tips on how agencies can boost their security capabilities while cutting costs.

NIST Seeks Input on App Testing

August 22, 2014
By Maryann Lawlor

The National Institute of Standards and Technology (NIST) is preparing recommendations to help organizations leverage the benefits of mobile apps while managing their risks.

Some Cyber Attackers Lie Low

August 14, 2014
By George I. Seffers

Lockheed Martin officials report that some attackers against their networks have disappeared—for now.

Policy Problems Vex Corporate
 Bring Your
 Own Device

September 1, 2014
By Sandra Jontz

The jury is still out in the corporate world as to whether the bring-your-own-device trend will gain a permanent foothold. While the movement creates security worries and extra work for information technology employees, it presents a few perks corporate leaders are reluctant to turn down: cost savings and increased employee productivity. Efforts for full implementation for both businesses and government entities are stymied much more by policy than by technology, or the lack thereof, experts say. While some technological shortcomings create some security risk, viable solutions are on the horizon.

Guest Blog: Cyber Trading Posts Ignite the Spark in Public-Private Collaboration

July 31, 2014
By Jessica Gulick

Partnerships are growing from disparate groups in search of the same goal.

Cybersecurity Challenges Vex Planners, Responders

August 1, 2014
By Robert K. Ackerman

The price of failure to provide adequate cybersecurity ultimately may be too high for any nation to tolerate. Yet, the cost of effective cybersecurity may be too much for a nation to afford.

National Labs and Industry Partner to Train Critical Infrastructure Cybersecurity Specialists

July 14, 2014
By George I. Seffers

Lawrence Livermore National Laboratory and Los Alamos National Laboratory join Bechtel BNI to train a new class of cyberdefense professionals. The program is designed to allow the national labs to recruit and rapidly develop cybersecurity specialists who can guide research at their respective institutions and create solutions that meet the cyberdefense needs of private industry.

Cryptography Advisory Group Addresses NIST Ties to NSA

July 14, 2014
By George I. Seffers

The National Institute of Standards and Technology (NIST) primary external advisory board today announced a report calling for the agency to increase its staff of cryptography experts and to implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts. In making its recommendations, the Visiting Committee on Advanced Technology (VCAT) specifically addressed NIST’s interactions with the National Security Agency (NSA).

Pages

Subscribe to RSS - Cyber