Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2014 FedCyber Date Announced - Registration Open

Please visit Events.FedCyber.com to register for this year's event which will be held on November 5, 2014 in Tyson's Corner.

Video Overview of the 2013 Event

The FedCyber Wire

Legal Departments Getting Proactive on Cybersecurity

“As cyberattacks against retailers, banks and other businesses continue to dominate headlines, companies are getting serious about the process of devising internal strategies for defense and response. These strategies are reaching beyond the IT function and landing on the general counsel’s desk. [...]


CIA looks to expand its cyber espionage capabilities

“The proposed shift reflects a determination that the CIA’s approach to conventional espionage is increasingly outmoded amid the exploding use of smartphones, social media and other technologies. U.S. officials said Brennan’s plans call for increased use of cyber capabilities in almost every c [...]


A Brief Explanation of Superfish

By Shannon Perry Sometimes big threats to consumers’ digital security and privacy come in the form of pre-installed programs, software built into consumer products that creates vulnerabilities that hackers can exploit. Last week, Reuters reported that the Department of Homeland Security issued an [...]


The IRS Knows What Computer You Are Using

“The Internal Revenue Service is preparing to give taxpayers and tax preparers new identity-theft protections for filing online returns, partly because ID fraud has cost the U.S. Treasury nearly $6 billion. One counter-fraud measure will capture identifying data from the laptop or PC used to file [...]


Every Cyber Attacker is an Insider

I recently witnessed the CIO of a publicly traded company dismissing the results of a successful red team to the Board of Directors by stating that the “the test wasn’t realistic as the red team had insider access.” The “insider” access in this instance was a network connection with no use [...]