cybersecurity

See the following -

Will Hackers Find Bioweapon Secrets In The Cloud?

Adam Mazmanian | FCW | April 1, 2014

The collision of big data and decoded genetic information is creating a wealth of opportunities for biologists, engineers and public health researchers. However, there is also the potential that advances in computing and genetics are providing potentially catastrophic opportunities for malefactors to hack into research computers to find information that could be adapted to create biological weapons.

Read More »

Will Open Source Security Be On The Federal Agenda In 2015?

Brian Heaton | Government Technology | January 8, 2015

A bill introduced late last year could be a precursor of things to come, as lawmakers wade into more cybersecurity issues...

Read More »

Will “Digital Fingerprint” Forensics Thwart the Data Thieves Lurking in Hospital EHR Corridors?

As Halloween approaches, the usual spate of horror movies will intrigue audiences across the US, replete with slashers named Jason or Freddie running amuck in the corridors of all too easily accessible hospitals. They grab a hospital gown and the zombies fit right in.  While this is just a movie you can turn off, the real horror of patient data theft can follow you...Unfortunately, this horror movie scenario is similar to how data thefts often occur at medical facilities. In 2015, the healthcare industry was one of the top three hardest hit industries with serious data breaches and major attacks, along with government and manufacturers. Packed with a wealth of exploitable information such as credit card data, email addresses, Social Security numbers, employment information and medical history records, much of which will remain valid for years, if not decades and fetch a high price on the black market.

Read More »

With White House CTO's Departure, Industry Looks for Signals

Josh Smith | NextGov | January 27, 2012

The White House announced Chopra's departure on Friday, but did not say why he is leaving or what his plans are. TechAmerica's acting President Dan Varroney said Chopra's belief in the "transformative nature of technology" allowed him to forge effective public-private collaboration. Read More »

‘Cybersecurity Has Become a Full-Time Job’ in Healthcare

Neil Versel | MedCity News | November 28, 2016

If 2015 was supposed to be the “year of the hack” in healthcare, cybercriminals really were just getting started. This year, we have seen the rise of ransomware targeting healthcare organizations, plus continued phishing attacks and even some good, old-fashioned laptop theft. Then, on Oct. 21, hackers unleashed a series of distributed denial-of-service (DDoS) attacks on the East Coast, effectively shutting down access for millions to popular sites, including Twitter, Spotify, PayPal, Netflix and Comcast...

Read More »

Apache Roadshow - Washington DC

Event Details
Type: 
Conference
Date: 
March 25, 2019 - 8:00am - 7:00pm
Location: 
Dewberry Hall within the Johnson Center at George Mason University Main Fairfax Campus.
United States

The Apache Software Foundation to present on Apache software projects in government, cybersecurity, and more at Roadshow and Open Source Job Fair at George Mason University. The DC Roadshow program features two dozen presentations on Apache projects across the following tracks: government, cybersecurity, CARE projects, and career development, in tandem with one of the first Open Source Software job fairs.Topics include The Apache Way, analytics, Big Data, Cloud, cybersecurity, governance, healthcare, machine learning and natural language processing (NLP), and security, featuring Apache projects such as Airflow, Cassandra, cTAKES, Daffodil (incubating), Drill, Fortress, Hadoop, Ignite, NiFi, Rya, Tomcat, and more.

Read More »

Cyber Resilience: Protecting Data and Immunizing Software

Event Details
Type: 
Seminar/Webinar
Date: 
April 21, 2020 - 2:00pm - 3:00pm

Two of the most innovative and impactful cyber security technologies will be featured in a one hour webinar. Cyber Reliant uses a unique shredding technology to protect data at rest, in transit, and in use. RunSafe Security transforms (or "stirs") existing software binaries on devices and in embedded systems to cyber harden them against memory corruption, supply chain, and zero-day attacks. Both of these technologies function under the assumption of breach. Don't miss this opportunity to hear about these two game-changing cyber technologies and ask the presenters your questions.

Read More »

Bad Actors Find Ways In - Webinar with RunSafe and Cyber Reliant

Event Details
Type: 
Seminar/Webinar
Date: 
July 1, 2020 - 11:00am - 12:00pm

Next Wednesday (July 1 at 1100 EST) two cyber technology companies that may will be discussing how their technologies can protect data, software, and hardware, even when a network is breached, the supply chain is compromised, and nefarious insiders have access. The two companies are Cyber Reliant and RunSafe Security.

Read More »

What are the Latest IoT threats to Network Security

Event Details
Type: 
Seminar/Webinar
Date: 
July 23, 2020 - 1:00pm - 2:00pm

Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Bob Baxley will examine recently disclosed vulnerabilities in protocols used by IoT devices which hackers can use to bypass your security, gain access to your systems, and exfiltrate data and voice information.

Read More »

Healthcare Cybersecurity Webinar Hosted by Plurilock and Cycura

Event Details
Type: 
Seminar/Webinar
Date: 
November 12, 2020 - 2:00pm - 3:00pm

Plurilock Security Inc. and Cycura, a subsidiary of WELL Health Technologies Corp. will be co-hosting a virtual panel discussion, titled 'Patient Data in the Crosshairs: Healthcare Breaches of 2020' on Thursday, November 12th at 2:00 pm (EST). Ian L. Paterson, CEO of Plurilock will be joined by Iain Paterson, CEO of Cycura, David Dowe, Director of Cybersecurity at ICES, John Daniele, VP Threat Intelligence at Scope Security, and Arjun Kumar, CIO at WELL Health to speak on the vulnerability of the healthcare sector and the necessary cybersecurity measures that need to be taken by healthcare companies to protect valuable information.

Read More »

ATARC Panel: Preventing Data Breaches from the Edge to the Cloud

Event Details
Type: 
Seminar/Webinar
Date: 
January 7, 2021 - 1:30pm - 2:30pm

Join us for this panel, which sets out to discuss how advancements in the federal cloud space, mobility and distributed workforces have driven the focal point for security to shift. Topic experts will discuss lessons learned in successfully implementing cloud methodologies, tools, and techniques in a time of continuous change and telework. Together, panelists explore available and desired solutions to rectify past and pre-empt potential future data breaches, as both citizens and the government agencies serving them embrace “the new normal”.

Read More »

Bastille Networks Zero Trust Cybersecurity Practices

Event Details
Type: 
Seminar/Webinar
Date: 
March 18, 2021 - 2:00pm - 3:00pm

Learn how to include Cellular, Bluetooth, BLE and IoT devices into your Zero Trust policy. Use Cases and Techniques for Enhancing your Zero Trust practices with examples featuring Bastille and automated Network Access Control (NAC ) systems. Zero Trust centers on the belief that we should not automatically trust anything inside or outside our perimeters. Instead of trusting a device’s authenticity, we must verify anything and everything that may attempt to connect to systems before granting access.

Read More »