The Air Force has awarded Northrop Grumman a three-year contract to upgrade cryptography in the country's intercontinental ballistic missile system.
The National Security Agency and the CIA helped Israel develop the "flame" computer virus.
Gordon Gillerman and Matt Scholl of NIST discuss standards, certification and accreditation with host John Gilroy. June 19, 2012(Encore presentation December 25, 2012)
Kaspersky Labs spotted malware disguised as a fake security app called "Android Security Suite Premium," Computerworld reports. The malware is a threat to everyday smartphone users as well as businesses that allow employees to use personal devices on the network.
After breaking into the network, the man allegedly tried to sell access to DoE for $50,000.
The Cybersecurity Technologies Research Lab's goals include building the scientific foundation for cybersecurity research, developing critical relationships and testing solutions in real-world situations.
Federal agencies running virtualized computer systems might be vulnerable to a new cyber attack. The warning comes from the U.S. Computer Emergency Readiness Team.
Last week it accidentally posted the home addresses of its newest top-level domain-name applicants, Government Computer News reports.
Health and Human Services has named entrepreneur Bryan Sivak as its chief technology officer. He replaces Todd Park, who moved on to the White House.
The Homeland Security Department showed lawmakers and staff how easy it is to create a spear phishing attack against a federal employee using free, open-source tools. The agency also said the Einstein 3 program is under development and will rely on vendors to provide intrusion prevention services. Sen. Joe Lieberman (I-Conn.) said he expects the cyber bill to go to the Senate floor for debate no later than July.
Gen. Keith Alexander, who runs the National Security Agency, endorsed the idea of using a cloud computing facility to share cybersecurity information with the private sector.
Heidi Avery is deputy assistant to the President for homeland security, on the National Security Staff.
The deal will help Northrup broaden its client portfolio amid dwindling defense sales and concerns about sequestration.
The cover up, as they say, is almost always worse than the crime itself. The rule of thumb, from the Watergate era, is follow the money, although people rarely do that. Following the money can be tricky. Also complicated. Especially in the computer age with multi- national players, Senior Correspondent Mike Causey says.
The new bill from Senators Sheldon Whitehouse (D-R.I.) and Jon Kyl (R-Ariz.) change the Department of Homeland Security's control over cybersecurity standards in the private sector.