How can the federal government attract the best and the brightest workers to develop the strongest cyber workforce on the planet? Hint: it\'s not just about hiring those with computer skills. We get details about a recent report from Booz Allen Hamilton and the Partnership for Public Service.
Grid Reliability clears the House, Botnet taken down by owner
Senate leaders pledge to pass a comprehensive cybersecurity bill this year. Sen. Lieberman promises a hearing and markup of the legislation before the end of June. Industry experts are concerned over the role DHS will play in regulating critical infrastructure.
Learn more in today\'s cybersecurity update.
Sens. Lieberman, Collins and Carper\'s legislation creates two new offices to oversee federal cybersecurity in DHS and the White House. It also forms a new Federal Information Security Taskforce made up of agency chief information security officers. Bill does not include \"kill switch\" provision for private sector networks.
Bill would put DHS in charge of all civilian networks
Learn more in today\'s cybersecurity update.
After Google hack, warnings pop up in SEC filings
The challenge of securing the nation\'s IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.
This week, Federal Security Spotlight talks with John Streufert of the State Department. June 10, 2010
Bradley Manning was detained during a tour of duty in Iraq.
Google denies use of private data, Adobe warns of critical security flaw in its products
The U.S. Cyber Command - or CYBERCOM - officially became operational in late May. But observers inside the military and out still aren\'t sure what the command is supposed to do: protect the Pentagon\'s networks, strike out at enemies, seal up civilian vulnerabilities, or some combination of all three. CYBERCOM officials insist they have no interest in taking over the security of the Internet, but Pentagon officials have floated the idea the Defense Department might start a protective program for civilian networks.
Carnegie Mellon University\'s Computer Emergency Response Team (or CERT) has released a new fuzzing framework that will help identify and eliminate security vulnerabilities from different kinds of software. The fuzz testers are used by security researchers to find vulnerabilities by sending random input to an application. Fuzz testing has been popular among hackers, but with the release of this framework, CERT can push businesses to subject all software to fuzz testing.
Learn more in today\'s cybersecurity update.