Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2014 FedCyber Date Announced - Registration Open

Please visit Events.FedCyber.com to register for this year's event which will be held on November 5, 2014 in Tyson's Corner.

Video Overview of the 2013 Event

The FedCyber Wire

Voice-activated devices pose security threat

“Voice-activated smartphones and other devices can be a significant security risk, warn researchers. An expert at security firm AVG found some voice-activated systems responded just as well to fake voices as they did to that of the owner.” Source: BBC News – Voice-activated devices pose securi [...]


Finding And Winning The Right Opportunities in DoD

As I walk around the exhibit halls of DoD Conferences, I try to stop at every booth, no matter how briefly. In the short time I am there, I want to understand what that company does and how they think their capability can support DoD. I am always surprised by how much talent is out […] [...]


Web attacks build on Shellshock bug

A series of attacks on websites and servers using the serious Shellshock bug has been spotted. Millions of servers use software vulnerable to the bug, which lets attackers run commands on that system. So far, thousands of servers have been compromised via Shellshock and some have been used to bombar [...]


FedCyber is Coming: 5 Nov in Tysons Corner

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges.  FedCyber will be held on 5 Nov 2014 at the Tysons Corner Marriott. This is a great oppo [...]


Shellshock: ‘Deadly serious’ new vulnerability found

A “deadly serious” bug potentially affecting hundreds of millions of computers, servers and devices has been discovered. The flaw has been found in a software component known as Bash, which is a part of many Linux systems as well as Apple’s Mac operating system. via BBC News – Shellshock: [...]


Taiwan probes Xiaomi on cyber security

The Taiwanese government is investigating whether Xiaomi Inc [XTC.UL], China’s leading smartphone company by domestic shipments, is a cyber security threat and will make a decision within three months. via Taiwan probes Xiaomi on cyber security | Reuters. Via OODA Loop [...]


Greater Smartphone Protections are Forthcoming

While Apple has made many headlines this month for the release of its new generation of the iPhone, this week the company has caused quite a stir with its latest announcement regarding its desire to enhance the encryption that protects its smartphones. In its press release, Apple asserts that it has [...]


Identity and Access Management: Hot or Not?

By Dean Wiech Identity and access management (IAM) is increasingly being deployed within organizations across multiple sectors as they recognize that a progressive approach to IAM is crucial for their companies. Though not yet mature, the IAM market continues to grow because of a number of influence [...]


2014 Analyst Forum: Cyber Security Panel Recap

By Shannon Perry On July 30th in northern Virginia, some of the greatest minds in analytics for business, outcomes, and mission impact gathered to share their lessons learned and experiences with data analytics. Academia, government, and industry came together to provide a comprehensive approach [...]