Hacktivism, cyber war and social engineering tactics expected to be among the most widely-used methods for spreading encrypted and dynamic malware
Microsoft patches 40 vulnerabilities in Windows, Internet Explorer (IE), Office, SharePoint and Exchange, including nine pegged \"critical.\"
The Navy\'s Fleet Cyber Command said a lack of real-time visibility into their computer networks is a problem. A new operations center opening this week at Ft. Meade will let technicians see cyber attacks as they are happening.
The Center for Internet Security is trying to establish universal metrics for cybersecurity functions. We talk with Steve Piliero, the chief technology officer of CIS. December 9, 2010
A competition to find a replacement for one of the gold-standard computer security algorithms used in almost all secure, online transactions just heated up.
Sri Lanka Information Communication Technology Agency (ICTA) has launched a national CERT (Computer Emergency Response Team) to act as the focal point for Cyber security for the nation.
Lawmakers have urged President Obama to expand the State Department\'s cyber authority.
NASA has a mandate to manage computer risks in real time.
The National Institute of Standards and Technology and the Homeland Security Department\'s Science and Technology directorate are teaming up with the private sector to improve the cybersecurity of financial services.
The military\'s use of personal identifiable information places service members at a higher risk of identity theft than the population at large.
The administration detailed a 25-point plan to improve the way agencies buy and manage technology. Current and former government officials say OMB is using lessons learned from the past to set the agencies up for success.
Former intelligence CIO Dale Meyerrose discusses the top cyber stories of the year.
Dec. 14th, 10:00 am Cyber-threats have created unprecedented technical and social challenges that have never before been addressed. In the past, when the enemy attacked you could see it, touch it and know what damage was incurred. A cyber-bullet can attack a country, a financial institution, or a power grid and we may not be able to detect or ever know or understand the full impact of the security breach. What are the issues that the public is facing due to cyber-threats? What progress is being made in regards to cyber-security? Join us for a discussion with experts in the field of CyberSecurity to learn about this tough subject and what we need to do to stay vigilant against cyber threats and attacks.
Center for Internet Security\'s Steve Piliero discusses his group\'s study on cybersecurity metrics.
Even worse, they\'re getting more sophisticated too.