The agency turns to teams of experts to review how departments are meeting the Trusted Internet Connections (TIC) initiative. DHS plans to expand the use of Blue Teams to the implementation of continuous monitoring and two-factor authentication under Homeland Security Presidential Directive-12.
Yahoo confirmed that a hacker group stole, then posted 450,000 unencrypted user-names and passwords from one of its services.
Thousands of people across the country have been conned into giving their Social Security numbers and other personal information online.
Sen. Richard Blumenthal (D-Conn.) said the United States is under cyber attack and that cybersecurity was a matter of national security.
The Air Force has awarded contracts to five companies to help it with a long-term cybersecurity project.
The Federal Network Security branch is performing Red and Blue teaming exercises to expose the soft spaces in agency networks and harden them. DHS has conducted five Red Teams and 28 Blue Team exercises in 2012. Federal CIOs and CISOs must request the Red Teams to analyze their networks. The agency receives a report on the biggest risks it faces.
Christopher Fountain, senior vice president of SecureInfo joins host John Gilroy to talk about IT security. July 10, 2012
Mark Weatherford became undersecretary for cybersecurity last fall. Since then, he has hired eight senior officials to fill high-profile positions.
The Wall Street Journal reported the largest Internet service providers took steps Sunday to make sure infected machines could stay online.
The Air Force Weapons School recently graduated its first six airmen specially trained in cyber warfare.
The Postal Service's E-Access system helps control employee access to systems and data. The single sign-on environment lets managers and database owners assign privileges to employees based on need.
In 2011, companies reported 198 cyber incidents to the Homeland Security Department — a nearly 383 percent increase above 2010, according to a June 28 report from the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). Companies reported nine such incidents in 2009., when DHS opened ICE-CERT to help protect private-sector operators critical infrastructure from "emerging" cyber threats.
Ted Davis, president of Unisys Federal Systems, will talk about how his company can help your transition to the cloud. July 3, 2012
Unmanned drones are vulnerable to computer hacking that could allow outside force to control them, according to new research.
Former White House Cyber Coordinator Howard Schmidt, who retired in May, has landed back in the private sector. Schmidt will join Qualys, a company specializing in information security and compliance cloud solutions.