The experts said too many chief information security officers have a compliance mentality. It's more important to understand the organization's mission and focus on protecting its most important data.
The FBI's Criminal Justice Information Services says local law enforcement needs to encrypt its data if it wants to join the cloud. The FBI said when information is encrypted from the start, police can have control of its cybersecurity on any cloud system, according to a post on InfoSecurity.
Several advocacy groups have raised major civil-liberties concerns about pending cybersecurity legislation, claiming the language may unfairly expose personal information and punish those who hide it.
Microsoft received 20 submissions in a contest to come up with new security technologies. The company's Blue Hat Prize will pay the winner $200,000.
A federal utility powering a third of the Pacific Northwest is vulnerable to computer breaches. An Energy Department audit found the Bonneville Power Administration, which services hospitals, banks, and critical military installations accounts for 30 percent of the region's power.
While Congress debates several new cybersecurity bills, a Congressional Research Service reports shows the government is already involved in regulating cybersecurity.
Jim Harper, senior policy analyst at the conservative Cato Institute, says that some of the cybersecurity bills Congress is considering are overreaching and may be unnecessary in the long run.
"Drive-by" malware infected more than ten million computers in February, according to a statistical analysis by Barracuda Labs. "Drive-by" malware describes files that people download from a site without knowing where it came from or what it really does.
The cybersecurity response center at the IRS is mostly working, according to a new report from the Treasury Inspector General for Tax Administration. However, in the report, Treasury Inspector General J. Russell George said that the Computer Security Incident Response Center isn't reporting every computer security incident as it's supposed to.
The legislative committee of the Council of the Inspectors General has weighed in on two Senate cybersecurity bills. The Cybersecurity Act of 2012 was introduced by Sens. Joe Lieberman (I-Conn.), Susan Collins (R-Maine) and Jay Rockefeller (D-W.Va.). Sen. John McCain (R-Ariz.), introduced the SECURE IT act.
A group calling itself \"Lulzsec Reborn\" claims to have hacked into the private information of 170,000 members of a military dating website. However, the owner of the website disputed the claim, since the dating service has only 140,000 members.
Agencies and companies can use CAPTCHA to make sure only people, and not bots, access certain websites.
The U.S. is host almost half of the systems infected with the botnet kownn as SpyEye, according to a new study from South Korea-based AhnLab.
\"Weaponized Word\" files are starting to tear up Mac computers, InfoSecurity reports. The documents take advantage of an existing weakness in the Mac version of Microsoft Office.
The Federal Aviation Administration has chosen cybersecurity firm Lunarline to lock down personally identifiable information in its systems. The company says it\'ll help the agency prevent unauthorized access and disclosure of such material.