The Defense Department\'s top technology research official wants to build better bridges with academia and industry - both to conduct present-day studies, and to train the researchers DoD will need in the future.
A sustained cyber attack has forced the French finance ministry to shut down 10,000 government computers.
Microsoft says \"everybody outta the IE6 pool!\"
The National Institute of Standards and Technology has released the final version of its guidelines for information risk management.
Robert Rodriquez, chairman and managing principal at the Security Innovation Network, explains how the conference encourages collaboration between federal cyber leaders and entrepreneurs, researchers and investors on cybersecurity innovation.
Tight budgets and a long procurement process will drive federal agencies into outsourcing cybersecurity. They\'ll buy it as a service instead of purchasing software to install and monitor agency systems.
Lots of computer smarties could help the federal government with its cyber security problem. But arcane rules prevent them from doing so.
Cyberattacks on state and federal databases are \"one of the nation\'s greatest emerging threats\", warned Maryland Gov. Martin O\'Malley.
The agency and the CIO Council creates a list of the competencies cybersecurity workers need. OPM\'s Kichak said agencies will have a common understanding of the skills and abilities these employees need.
Gen. Keith Alexander, commander of the military\'s new Cyber Command and the director of the NSA, said DoD can help protect private networks from cyber attack - especially critical infrastructure - without infringing on civil liberties. He said civilian agencies and private network operators could leverage NSA\'s capabilities without having the spy agency be in charge of security.
The administration\'s IT agenda for fiscal 2012 will include new tools to combat cyber threats as well as major overhauls to how agencies manage their systems. Agency CIOs say agility will be important moving forward.
Government IT systems are at increased risk to inside and outside threats because departments lack centralized budget and operational authority over their IT systems, says Roger Baker.
OMB mandated departments implement continuous monitoring of their cyber networks by 2012. Part of meeting that goal is understanding what hardware and software currently reside on the computing backbone.
A Texas man who admitted hacking into the computer systems of a Minnesota company and NASA\'s Goddard Space Flight Center in Maryland pleaded guilty Wednesday to one count of wire fraud.
The Cyber Command is focused on achieving real-time capabilities, but the director of current operations said they still have serious work to do. He appealed to industry leaders for help designing a sufficient platform.