Cybersecurity

Healthcare job applicants given real patient data for practice

Healthcare and Public Health // California, United States

Digital Government

Lockheed Clinches $82.5 Million Sole-Source Cyber Range Deal

The defensewide system for simulating hacks depends on the contractor’s source code and expertise.

Cybersecurity

Watch the Global Hacking War in Real Time With a Map

The US and China are locked in an escalating war about online spying that threatens to devastate business for companies in both countries.

Cybersecurity

Continuous monitoring: Closer than you think

Many agencies are using a patch management tool that can be a powerful ally in the quest for continuous monitoring.

Cybersecurity

Feds Poised to Revamp FBI.gov

Job likely requires protecting the site from hacktivists who enjoy knocking it offline to protest alleged government overreach.

Cybersecurity

FITARA in the Senate, Eagle II protests, NASA access controls and more

News and notes from the federal IT community.

Cybersecurity

Hackers Breached a Major Hedge Fund to Steal Information on Trades

The culprits installed malware, bringing the firm's high speed trading to a halt, and redirecting trade information to the hackers' machines.

Cybersecurity

U.S. Marshals Accidentally Reveal Email Addresses of Potential Bitcoin Buyers

Recipients were supposed to see an FAQ, not a list of possible competitors in the public sale.

Cybersecurity

Nation State-sponsored Attackers Hacked Two Airports, Report Says

The victims were among 75 airports targeted by a prolonged cyberspy operation.

Cybersecurity

Does the intelligence community have a handle on its contractor workforce?

According to a GAO report, intelligence agencies lack an accurate picture of contractors costs and mission.

Cybersecurity

Cyber staffing and NOAA mapping

News and notes from around the federal IT community.

Cybersecurity

Brennan: Technological change tough for CIA

The CIA director also said that although digital footprints aid in tracking down terrorists, they increase the vulnerability of agents in the field.