Cybersecurity

  • The National Institute of Standards and Technology and the Homeland Security Department\'s Science and Technology directorate are teaming up with the private sector to improve the cybersecurity of financial services.

    December 10, 2010
  • The military\'s use of personal identifiable information places service members at a higher risk of identity theft than the population at large.

    December 10, 2010
  • The administration detailed a 25-point plan to improve the way agencies buy and manage technology. Current and former government officials say OMB is using lessons learned from the past to set the agencies up for success.

    December 10, 2010
  • Former intelligence CIO Dale Meyerrose discusses the top cyber stories of the year.

    December 09, 2010
  • Dec. 14th, 10:00 am Cyber-threats have created unprecedented technical and social challenges that have never before been addressed. In the past, when the enemy attacked you could see it, touch it and know what damage was incurred. A cyber-bullet can attack a country, a financial institution, or a power grid and we may not be able to detect or ever know or understand the full impact of the security breach. What are the issues that the public is facing due to cyber-threats? What progress is being made in regards to cyber-security? Join us for a discussion with experts in the field of CyberSecurity to learn about this tough subject and what we need to do to stay vigilant against cyber threats and attacks.

    December 08, 2010
  • Center for Internet Security\'s Steve Piliero discusses his group\'s study on cybersecurity metrics.

    December 08, 2010
  • Even worse, they\'re getting more sophisticated too.

    December 08, 2010
  • Computer software targeted by Stuxnet is used in US infrastructure but the virus does not appear to have affected any systems in the United States, a US cybersecurity official said Tuesday.

    December 08, 2010
  • The agencies sign a MOU to work more closely on research and development on new technologies to protect the financial services sector\'s critical infrastructure. This agreement follows a pilot DHS and DoD have been working on to share threat information.

    December 07, 2010
  • \"We want to protect the end user and we don\'t want them to care if it was antivirus or personal firewall; you want to protect them in a broader scheme,\" says ISCA Labs.

    December 07, 2010
  • Demand for vendor-furnished information security products and services by the U.S. federal government will increase from $8.6 billion in 2010 to $13.3 billion in 2015 at a compound annual growth rate (CAGR) of 9.1%. INPUT\'s John Slye explains why.

    December 06, 2010
  • IBM has a new tool to spot security vulnerabilities even while they\'re being written.

    December 06, 2010
  • \"I\'ve actually extended the time for industry to comment to Jan. 17,\" said federal CIO Vivek Kundra.

    December 03, 2010
  • The federal CIO Vivek Kundra will roll out specifics about the administration\'s plan to change the way agencies buy and manage technology. The administration wants to give CIOs more authority over the budget for commodity IT such as e-mail or infrastructure. Kundra also said 2012 budget request will include requirements for continuous monitoring of agency networks.

    December 03, 2010