Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

Credit card details on 20 million South Koreans stolen

“Credit card details from almost half of all South Koreans have been stolen and sold to marketing firms. The data was stolen by a computer contractor working for a company called the Korea Credit Bureau that produces credit scores. The names, social security numbers and credit card details of 20 m [...]


NIST To Hold Data Science Symposium 4-5 March 2014

By Bob Gourley The National Institute of Standards and Technology (NIST) Information Technology Laboratory is holding a Data Science Symposium we believe will be of high interest to the enterprise CTO community. Symposium topics include the technology landscape of data science, ways to improve analy [...]


Kenya creates special cyber-crime unit

“Tobiko revealed that Kenya looses in excess of $23.3 million a year to cyber-crime. ‘In view of the rising incidents of cyber-crime, the Office of the Director of Public Prosecutions (ODPP) has established a dedicated unit to spearhead the prosecution of cyber criminals. Kenya is losing an esti [...]


Report: Target breach part of broader scam

“The security breach that hit Target Corp. during the holiday season appears to have been part of a broader and highly sophisticated scam that potentially affected a large number of retailers, according to a report published by a global cyber intelligence firm that works with the U.S. Secret Servi [...]


Syrian Hackers Breached Microsoft’s Corporate Email

“A band of hackers claiming to be working in support of the embattled government of Syrian President Bashar al-Assad attacked and gained access to corporate email accounts belonging to employees of software giant Microsoft. The attack comes days after the same group, the Syrian Electronic Army, cl [...]


A First Look at the Target Intrusion, Malware

“This type of malicious software uses a technique that parses data stored briefly in the memory banks of specific POS devices; in doing so, the malware captures the data stored on the card’s magnetic stripe in the instant after it has been swiped at the terminal and is still in the system’s me [...]