About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

NetworkToolbox- Network scanning and analyzing

Bob Gourley Network Toolbox may be the best network app on in the Apple App Store. It is designed for both iPhone and iPad and if you are an enterprise IT professional or just a technology enthusiast it belongs on your iOS device. The Toolbox contains a suite of 32 tools that will help you [… [...]

Botnet Uses IoT Devices to Power Massive DDoS Attacks

“LizardStresser, a distributed denial of service (DDoS) botnet that inspired many cybercrime groups to create their own botnets, was recently used in attacks as large as 400 gigabits per second (Gbps) that leverage the power of IoT devices, Arbor Networks researchers reveal.” Source: Botnet Uses [...]

Sophos Blasts Cylance’s Competitive Testing Methods

“Dan Schiappa, VP with Sophos, has published what amounts to a stinging rebuke against Cylance product comparison methods. The specific incident involved a comparative test between Cylance and others, including Sophos. Cylance came out best — but a Sophos customer in the audience reportedly aske [...]

Thomson Reuters Terrorism Database Leaked Online

“An online database containing the names of 2.2 million heightened risk individuals and organizations was left unprotected and downloaded by a security researcher who has considered making the information public. Over the past months, researcher Chris Vickery has identified many misconfigured data [...]

Should Cyber Warfare Have Its Own Branch?

“If cyber warfare remains just a niche within military services, the U.S. will never be able to develop the talented warriors it needs. In 1947, the U.S. defense establishment finally recognized that airpower was an environment distinct and separate from sea or air. It required specialized knowled [...]

Researchers Disrupt Iranian Cyberespionage Campaign

“Researchers at Palo Alto Networks have managed to disrupt an Iran-linked cyberespionage campaign targeting governments and businesses from all around the world. The security firm reported in May that it uncovered a new malware family that had been used in espionage operations since at least 2007 [...]