Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2015 FedCyber Date Announced - Registration Open

This year's event will be held on November 10, 2015 in Tyson's Corner. Register today at Events.FedCyber.Com

FedCyber 2014 Overview

Video Overview of the 2013 Event

The FedCyber Wire

Singapore military hack ‘probably state sponsored’

“The Singaporean military’s dedicated web access system was breached this month by hackers thought to be hunting for official secrets, the government said on Tuesday.” Source: Singapore military hack ‘probably state sponsored’ | This Week In Asia | South China Morning Post Via OODA Loop [...]


Sweden to scale up cyberwar defense funding

“Plans to reinforce spending on cyberwarfare defense programs comes as the National Defence Radio Establishment, the Swedish Defense Forces’ central signals intelligence wing also known as FRA, warns of increasingly aggressive cyber-based assaults by state-backed foreign powers. The warning by  [...]


Pentagon Launches Open-Source Coding Experiment

“The Defense Department this week launched Code.mil, a public site that will eventually showcase unclassified code written by federal employees. Citizens will be able to use that code for personal and public projects. Code written by government employees can be shared with the public because that [...]


Cyber Security Skills Businesses Will Look For in 2017

Rick Delgado The coming year brings new opportunities for businesses to grow and develop with the latest data tools, but with this advancement comes a series of risks and downfalls. Cyber security is a more pressing issue than ever, with hackers and cyber terrorists advancing all the time. That’s [...]


Cyber isn’t all that special, says NSA chief

“Don’t be intimated by the technical aspects of cyber, he told conference attendees. ‘Don’t make this thing so specialized, so unique, so different that it just gets pushed to the side. That will sub-optimize our ability to execute cyber operations, and quite frankly it will minimize or at l [...]


Amid cyberattacks, ISPs try to clean up the internet

“In more extreme cases, Level 3 can essentially block bad traffic from harassing victims, and effectively shut down or disrupt the hackers’ attacks. So why aren’t ISPs doing more to crack down on cybercrime? The issue is that an ISP’s ability to differentiate between normal and malicious int [...]