Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Four cybersecurity bills will be considered in the House next week, calling for more coordination in developing unclassified computer networks and in writing cybersecurity standards.
The House of Representatives is expected to take up several cybersecurity bills next week, one of which is aimed at updating the Federal Information Security Management Act. So far, the bill has earned bipartisan support.
The FBI's former top cyber cop has taken a job with a startup company to help protect private-sector computer networks that he says are already under constant attack with intrusions.
Microsoft researchers says those scary vendor reports warning about the value of cyber crime losses are mostly bunk. That's because they are based on surveys, and surveys are easy to bias.
Speaking at the National Space Symposium in Colorado Springs, Colo., the Air Force's top cyber commander, Maj. Gen. Suzanne Vautrinot, stressed the importance of offense, defense and exploitation when forming cybersecurity strategy.
The Homeland Security Committee passed the Promoting and Enhancing Cybersecurity and Information Sharing Act.
The U.S. Chamber of Commerce has sent a list of cybersecurity recommendations to the House of Representatives, in light of Congress's multiple cybersecurity bills.
The Defense Department has outlined a strategy to extend traditional treaty alliances to cyberspace.
The House Committee on Homeland Security will mark up the Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness Act of 2011 today. All members of the House got a snapshot of the nation's cyber threats yesterday in an interagency briefing.
Digital signatures are mathematical algorithms that ensure authenticity of digital documents. They are specified in Federal Information Processing Standard, or FIPS 186 — 3. The standard first came out in 1994.
Jeremy Grant, the senior advisor for National Strategy for Trusted Identities in Cyberspace, said his group is about to award a contract to manage a future set of working groups, each of which will develop a component of the ID ecosystem.
The Flashback Trojan that infected more than 600,000 Apple computers at its height has been largely contained, according to a new report in TechNews World. But cybersecurity experts warned that new variants still pose a threat.
GSA, NIST to name the first batch of outside organizations who will test and validate commercial cloud products against baseline security standards in the FedRAMP cloud security program in May. The Joint Authorization Board also will release guidance to industry on how to implement the security requirements in the coming months. FedRAMP still is months from approving its first set of vendors.
The Duqu virus, widely known as a "twin" to the Stuxnet worm that targeted Iran's nuclear infrastructure, is evolving yet again. Software security firm Symantec said the program has a new variant altered "just enough...to evade some security product detections."