A group of computer hackers hijacked websites run by the Voice of America this week, sending its online traffic to an Internet website claimed to be run by the Iranian Cyber Army.
The Air Force wants to create a whole unit of non-existent identities on social media sites.
DoD is trying to figure out how to keep risks that one part of the organization takes from affecting the rest of the military\'s networks. DISA addressing other security goals by adding PKI to secret network.
A new cyber competition and conference have been designed to attract more students and young professionals to pursue careers in cybersecurity. SAIC\'s Larry Cox explains.
Internet attacks from hackers, spies and terrorist groups deserves serious attention, says Howard Schmidt, but this should not be \"to the extent of mass hysteria\".
No one should be allowed to shut down the internet in the United States. So says Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman.
Josh Stephens, vice president of Technology and Head Geek for Solar Winds, told the DorobekINSIDER that agencies\' tech shops need to embrace the change - not avoid it.
The Navy\'s cyber command will soon be able to see a real-time view of penetration attempts into the service\'s IT systems, the command\'s number two officer said Thursday.
OPM has completed a governmentwide cybersecurity survey to approximately 50,000 employees and their supervisors who handle cybersecurity as part of their daily job responsibilities.
GAO\'s biannual list includes 30 programs that are in trouble. House and Senate members promise to focus more of their attention on the initiatives most at risk. Members plan to use the model that worked for DoD and personnel security clearances in other problematic areas.
More than 100 foreign intelligence agencies have tried to crack the DoD computer networks.
Cybersecurity adds to a slight increase in federal IT spending proposed for FY 2012
Continuing to operate at 2010 funding levels under a continuing resolution would be a crisis for the military, Defense Secretary Robert Gates said Monday. He made the remarks at a briefing detailing DoD\'s proposed budget for 2012.
DHS is seeking public comment on the data collection forms that will be used for the CyberForensics Electronic Technology Clearinghouse (CyberFETCH) program.
A Congressional subcommittee heard testimony from three cybersecurity experts Friday who said the Defense Department should share more information on cyber threats with private network operators. The hearing, which examined DoD\'s role in the nation\'s cyber defense, produced a consensus that the country needs to do more to protect itself from cyber threats, the subcommittee\'s chairman said.