Latest stories

  • DHS Used Lockheed's Cyber Platform to Analyze Russia-Backed Critical Infrastructure Attacks - top government contractors - best government contracting event
    in ,

    DHS Used Lockheed’s Cyber Platform to Analyze Russia-Backed Critical Infrastructure Attacks

    The Department of Homeland Security used a Lockheed Martin-built cybersecurity framework to evaluate cyber attacks that state-sponsored Russian hackers carried out against U.S. critical infrastructure sectors. Lockheed’s Cyber Kill Chain framework provided information on the attackers’ activities, including reconnaissance, weaponization, delivery, exploitation, installation, command and control and actions on objectives, DHS’ U.S. Computer Emergency Readiness Team said March 15 in […] More

  • Stephen Kopeck Joins Kroll as Cybersecurity & Investigations Associate Managing Director - top government contractors - best government contracting event
    in

    Stephen Kopeck Joins Kroll as Cybersecurity & Investigations Associate Managing Director

    Kroll has appointed Stephen Kopeck as associate managing director for its cybersecurity and investigations practice, where he will report to practice leader Tim Ryan. The risk mitigation services provider said Monday Kopeck, a former special agent with the U.S. Secret Service, holds experience in work with law enforcement and other private sector companies. “He brings extraordinary levels of technical expertise as […] More

  • Deltek: Security Management Most Vulnerable Among Agency IT Security Controls - top government contractors - best government contracting event
    in ,

    Deltek: Security Management Most Vulnerable Among Agency IT Security Controls

    Deltek has highlighted the growing number of security incidents and high-risk areas in federal information systems in reports by the U.S. Computer Emergency Readiness Team and Government Accountability Office. Kyra Fussell, a senior research analyst at Deltek, writes Tuesday that the recent addition to the high-risk list is the privacy of personally identifiable information. According to Fussell, […] More