Pages

Categories

Search

 

About FedCyber

FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. The FedCyber web site serves as the community nexus and information aggregator.

2014 FedCyber Date Announced - Registration Open

Please visit Events.FedCyber.com to register for this year's event which will be held on November 5, 2014 in Tyson's Corner.

Video Overview of the 2013 Event

The FedCyber Wire

FusionX: Persistent Cyber Risk Management

By Bob Gourley FusionX is a firm made up of long-term and highly trusted associates who I have served with for over a fifteen years (including  Matt Devost and Tom Parker). I know them well and consider them to be among the most capable consultants in cyber security. Their methods and models h [...]


Join us at the 2013 Federal Forum, August 6th

By Ryan Kamauff On August 6th at the Ronald Reagan Center in Washington DC, MeriTalk and Brocade will be hosting a fantastic event. It will be hosted by Anthony Robbins, the Vice President of Federal Sales at Brocade. Lloyd Carney, CEO at Brocade will be introducing Terry Halvorsen, CIO of the Navy [...]


Hype Alert! Cyber Damage Estimates Hacked!

By Bob Gourley There are threats to our nation’s IT infrastructure and I advocate we all be serious about them. But it is counter productive to exaggerate the threat. The same can be said about the threat of cyber theft of corporate intellectual property and even the espionage threat. These are se [...]


Viber Attacked By Syrian Electronic Army

“Viber has confirmed a situation earlier this morning in which Viber appeared to have been hacked by the Syrian Electronic Army (a pro-government group of computer hackers aligned with Syrian President Bashar al-Assad). AppleSpot originally reported on the hack that affected the Viber support page [...]


The Challenge Posed by Chinese Psychological Warfare

“Beijing hopes to win future conflicts without firing a shot. How? By using psychological warfare to manipulate both a nation’s leaders and its populace—affecting the thought processes and cognitive frameworks of allies and opponents alike. Indeed, the PRC’s psychological warfare operations [...]


Indonesia Joins China as Cyber-Attack Powerhouse

“Indonesia isn’t known as an epicenter for hacking, but the Southeast Asian country was the source of 21 percent of the world’s cyber-attack traffic in the first quarter of this year, according to a report by Akamai Technologies to be published later today. The type of activity observed in Ind [...]


Announcing the 2013 Data Impact Awards

By Bob Gourley Cloudera has just announced an awards program designed to highlight repeatable solutions that achieve great things for key mission areas. This program, called the “Data Impact Award,” will bring focus to CDH users and the applications they are building around the Big Data solution [...]


UN group to issue warning about mobile phone hacking

A U.N. group that advises nations on cybersecurity plans to send out an alert about significant vulnerabilities in mobile phone technology that could let hackers attack at least half a billion phones.The bug, discovered by a German firm, lets hackers gain remote control and clone certain types of mo [...]


Apple acknowledges that developer site was hacked

“In an email to developers on Sunday, Apple acknowledged that the reason behind the lengthy developer site outage was because of a hacking attempt on Thursday. Apple said that personal information was not accessed, however it is double checking to make sure that developer names, emails and physica [...]