Wait, don't miss out on the latest GovCon industry news!

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings

*By clicking "Join us now" you agree to receive email, promotions and general messages from ExecutiveBiz, In addition, you also agree to ExecutiveBiz Privacy Policy and Terms & Conditions.

Remind me Later x

Latest Federal & Government Contracting Companies' News Coverage

Advertisements

Latest Federal & Government Contracting Companies' News Coverage

Advertisements
Advanced Search
Showing 1-12 of 1519
Present: Chief Medical Officer, Deloitte, Federal Health Practice Career highlights: Before joining the private sector in 2004 (first, at Oracle, BearingPoint, and finally, Deloitte in May 2009), Cowan had a 33-year career in the U.S. Navy. During Operation Restore Hope in Somalia, he served as the Joint Task Force (JTF) Surgeon. “I will forever be […] More
Earlier this year, Google announced that it, along with a number of other companies, was the target of a cyber attack. Since that time, law enforcement and private companies have been working to unravel more details about the attack. Last month, the attack was partially traced to two schools in China and researchers believe they […] More
Symantec Corporation is helping the government in its investigation of the Aurora attacks against search engine giant Google, CEO Enrique Salem said earlier this week. Symantec monitors millions of computers worldwide and has significant data on malware infections and other cyber attacks which they sometimes sell to federal agencies and companies. During an interview with […] More
KBR’s Bill Bodie commented on the firm’s $2.8 billion Iraq contract win. Northrop Grumman’s James Webb telescope reached a major milestone. New SBA rules mean more opportunities for women-owned small businesses. DARPA wants Apple iPhone and Google Android smartphone apps for military use. The GSA is rethinking its cloud strategy in response to negative feedback. […] More
After the large scale attack on Google and more than 100 other corporations late last year, research has shown that companies are defenseless. In a study by iSEC on response recommendation for “Aurora,” seven common patterns were identified. Many of these patterns center around common online practices. A typical attack, says iSEC, would proceed something […] More
This week, RSA’s conference in California looks “ to drive the worldwide information security agenda,“ says conference general manager Sandra Toms LaPedis. As instances of cyber attacks continue to grow more prevalent, cyber warriors and national security officials are gathering in California to examine methods to enhance cyber defenses. The RSA conference, held in San […] More
Recently, a reported phishing attack using Twitter unknowingly compromised user account information.  Users received tweets or direct messages using phrasing such as “This you?” or ” LOL is this you” which then sent the Twitter user to an account which asked for identification verification. Then the user is directed towards the Twitter fail whale. Most […] More
Recently, an additional 60 sites have been found to host SEO poisoning activity. SEO attacks have been increasing with people primarily using Google to point searchers to infected domains. These other sites launch malware, phishing attacks and IFrame SEO attacks.  Topics are broad ranging and often connected. Criminals also use well researched terms to place […] More
As troubling news emerges about America not being ready for a potential cyber war, more companies are becoming acutely aware of the importance of preparing for web-based attacks. “If we went to war today in a cyber war, we would lose,” said former Director of National Security and National Intelligence Michael McConnell during a hearing […] More
As the US looks to build increased cybersecurity capabilities, the role the government should play is increasingly coming towards the center of the debate. James Lewis of the Center for Security and International Studies (CSIS) wants to see the government take a more central role in increasing cybersecurity on US networks. At the 2010 Government […] More
The past 10 months have been very active in the field of cybersecurity. In May 2009, Melissa Hathaway published her findings from the 60 day Cyberspace Policy Review. In December 2009, President Obama announced that Howard Schmidt would hold the position of Cybersecurity Coordinator at the White House. In January, search engine giant Google announced […] More
One school district in Pennsylvania is using Macbook cameras for a whole new purpose. Parents in this district believe that schools periodically turn on the cameras to monitor the student and their usage of the county issued computer. Parents are outraged and have asked a federal judge to ban the practice. The school district insists […] More
Back to Top

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

To use social login you have to agree with the storage and handling of your data by this website.