Special Bulletin Review: Securing our Citizens while Modernizing

  • Long-time privacy and cybersecurity expert to join the government to work on similar issues. EPA\'s Lisa Schlosser also takes on a new role at her agency.

    August 06, 2010
  • A new report finds the vast majority of U.S. supply chains rely on information technologies that can be compromised at any time. We get details from Tom Wilkerson, CEO of the Naval Institute.

    August 06, 2010
  • Cyberthreat report released

    August 06, 2010
  • Securing cyber-space has become a global challenge, and the GAO has ideas about what agencies can do to be prepared.

    August 05, 2010
  • One professor explains why DoD needs to be concerned about using social media.

    August 05, 2010
  • Security Threat Report reveals attitudes to cyberwarfare, Patch or we go public, says bug bounty program

    August 05, 2010
  • Learn more in today\'s cybersecurity update.

    August 04, 2010
  • New threat: Hackers look to take over power plants

    August 04, 2010
  • Learn more in today\'s cybersecurity update.

    August 03, 2010
  • The vulnerabilities of critical energy infrastructure installations to potential cyber attack are normally treated as restricted information and are exempt from public disclosure.

    August 03, 2010
  • DOE raises concern over safety of electric grid

    August 03, 2010
  • August 12th, 2010 at 11 AM How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next \"Killer App\"?

    August 02, 2010
  • August 11th at 11:05am The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled\' position to one that is now ‘network dependent.\' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries. The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.

    August 02, 2010
  • Microsoft Quashed Effort to Boost Online Privacy, Hacker builds $1,500 cell-phone tapping device

    August 02, 2010