NASA\'s inspector general designated information technology security as one of eight top management and performance challenges the space agency faces.
A new report found that for 15 minutes in April a Chinese state controlled telecommunications company was able to hijack 15 percent of the world\'s internet traffic.
Security community urges lawmakers to consider feedback regarding how to solve federal human capital crisis in cybersecurity. ISC\'s Hord Tipton gives us details on a new poll.
Facebook\'s revamped Messages will be a very attractive target for spammers, scammers and malware makers, according to security experts.
A leading House proponent of cybersecurity legislation is doubtful new cyber laws will pass during the lame duck session.
The Wounded Warrior Project is a new collaboration among Raytheon, Cisco - it offers wounded veterans a chance to learn computer and cybersecurity skills. Bob Connors, project director, talks with Federal News Radio about the details.
China hijacked fifteen percent of Internet traffic across the globe. Nobody noticed, except for some cybersecurity experts. They may have also had access to data from U.S. military, civilian organizations and those of other U.S. allies.
Raytheon and Cisco are joining up to expand the Wounded Warrior Project. The programs they are sponsoring make it easier for wounded servicemen and women to re-enter the workplace with the skills they need to become cybersecurity professionals.
Chertoff wants to see the nation\'s cyber defense increased, telling the BBC that cyberspace is just as integral to our nation\'s security as ground, sea and air warfare.
Fidelity Investments slashes its stake in Sourcefire
The service is giving careful thought to the human side of the cybersecurity equation. The top commander of the Air Force\'s Space Command said it\'s no longer a matter of information assurance, and it\'s all about mission assurance.
Despite constant alerts and tips to avoid phishing scams and other viruses, Americans still expose themselves to harm.
An International Cyber Range for realistic assessments of cyberwarfare scenarios is being developed.
Chris Johnson oversees the National Vulnerability Database at the National Institute of Standards and Technology. He is Tom Temin\'s guest this week on Federal Security Spotlight. November 11, 2010
Basic training at Lackland Air Force Base, Texas, now includes two sections on being a good \"cyber wingman\" and taking care of the network, and the Air Force Academy now offers a cybersecurity major.