A UMBC research park emerges as front line of defense in Cyberwars.
White House strategy gives the Commerce Department bureau the ability to bring industry, privacy, security and other experts together to develop policies and standards. The administration made it clear the private sector will lead the effort and the government is only creating a marketplace for these services.
Federal News Radio viewed a copy of the proposal that would codify DHS\'s role in overseeing civilian agency networks. The draft legislation would expand DHS\'s authorities to those that are similar to what DoD already has around cyber. It also would include new roles around acquisition, personnel and FISMA implementation.
\"We are not DHS. We are not DoD,\" says Jerry Horton, chief information officer at USAID.
Like natural ecosystems, the cyber ecosystem has many participants. DHS\'s Greg Schaffer explains how it all fits together.
In a move to control the contollers, criminal servers have been swapped for government servers to intercept communications between infected systems and the servers controlling them.
The United States is still \"hugely vulnerable\" to cyber attacks, but so are most other nations, a former chairman of the Joint Chiefs of Staff said Monday.
The Air Traffic Organization is in the middle of one of the largest pilots in government testing mobile computing devices. ATO CIO Steve Cooper said business organizations must have a valid need to use the devices. Cooper said ATO will test other mobile devices this spring.
Cyber-attackers could view a shutdown as the perfect opportunity to infiltrate government systems. ISC squared\'s Hord Tipton joins us with analysis.
IBM\'s report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. We get details from IBM\'s Kris Lovejoy.
Microsoft makes court documents public as part of battle to provide cloud services to the Interior Department. Google contends its Google Apps for Government offers more security than FISMA requires.
Sen. Sheldon Whitehouse (D-R.I.), who led a Senate Intelligence Committee review of cybersecurity policy last year, said he is hopeful that Congress will be able to pass an overhaul of cyber laws this year. Whitehouse has been critical of the pace at which the Obama Administration has moved to propose such changes to lawmakers.
A hacker convicted of stealing credit and debit card numbers says the Secret Service authorized his criminal activity.
Every agency is in search of good leaders and good managers. But it is important to recognize the distinction.
DHSers who perform cybersecurity functions would not be furloughed during a government shutdown, including contractors.