Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2014 FedCyber Date Announced - Registration Open

Please visit Events.FedCyber.com to register for this year's event which will be held on November 5, 2014 in Tyson's Corner.

Video Overview of the 2013 Event

The FedCyber Wire

ICANN hires hacker to keep Internet safe

via Associated Free Press SAN FRANCISCO — The agency in charge of the world’s Internet addresses on Thursday appointed veteran hacker Jeff Moss to be its chief of security. Moss, whose hacker name is Dark Tangent, is the founder of Black Hat computer security conferences as well as an infamo [...]


Sony: Personal info compromised on PSN

via news.cnet.com Sony acknowledged today that the personal information of its PlayStation Network customers has been compromised. The company posted an update on its blog today warning its more than 70 million customers that their personal information, including customer names, addresses, e-mail ad [...]


Security Shuffle Starts Week

via ExecutiveBiz The beltway was hopping this week with major moves and mergers. Across our media properties, we tracked news at the FBI, a changing of the guard at DoD and the changing faces at some of GovCon’s executive tables. ExecutiveGov topped the news this week with reports that Central [...]


Breach Costs Texas $1.8 Million

via Gov Info Security A Texas state comptroller office computer breach that exposed the personal information of 3.5 million individuals has cost taxpayers $1.8 million, with that figure likely to rise, according to a report posted Friday on the website of an Austin newspaper. In addition, the exposu [...]


The Evolution of Information Protection

via Armed with Science Information protection has evolved along with our information technology. Ciphers first protected written information. Ciphers then evolved into cryptography, which evolved into information security (INFOSEC). INFOSEC evolved even more when it fully incorporated computer secur [...]