Technologies developed for federal government may have been used to \"harm U.S. citizens on behalf of clients in the private sector.\"
NASA\'s internal computer network is full of holes and vulnerable to a cyberattack, an audit by the Office of the Inspector General has found.
The cyber security industry needs workers, and is expected to see a shortage as the industry grows. The Baltimore Business Journal reports that the Anne Arundel Workforce Development Corp is going to try to help.…
The National Security Agency tests a new IT architecture for securing data on mobile devices.
The Department of Homeland Security says cyber attacks against the federal government jumped by 40 percent last year.
Based on new figures, the military expects to spend more than three times what DHS is requesting for cyber operations.
The agency will issue its first Call Letter of 2011 Friday detailing suggestions for insurance carriers to focus on wellness and healthy lifestyles. Director Berry also wants insurance providers to offer affinity benefits for domestic partners of federal employees. Later this year, OPM will launch a new medical claims database to improve the plans.
Sentrigo\'s flagship product, Hedgehog Enterprise, monitors databases for illegal or unauthorized activity.
So what are the cyber challenges facing the Naval Postgraduate School?
How bad is the hacking of RSA for the federal government? We ask CERIAS\'s Gene Spafford.
Gen. Keith Alexander has outlined a series of next steps to be pursued by the six-month-old U.S. Cyber Command.
The Google and University of Maryland Cybersecurity Seminar Series will feature a diverse group of speakers from industry, academia, and government, addressing a broad range of topics related to cybersecurity, including technology, policy, and economics. Invited speakers will also examine the impact that cybersecurity threats and protective measures are having on privacy, identity, social networks, business and national security.
The hack attack that breached tools provided by RSA has affected federal users, but the Homeland Security Department is advising agencies, they don\'t need to replace the product.
The Department of Defense is working with private developers to create a system that automatically detects and prevent network intrusions.
Cyber Command gave no reason for the turnabout in policy.