Eight Republican lawmakers on Thursday introduced an alternative to a comprehensive cybersecurity bill the Senate expects to vote on soon. GOP senators say their approach avoids additional bureaucracy and encourages information sharing.
The lawmakers believe the legislation, called the Strengthening and Enhancing Cybersecurity by Using Research, Education, Information, and Technology Act or SECURE IT, would be more collaborative and less regulatory than the bill introduced in February.
The committee charged with assuring cloud computing services meet federal cyber standards under the FedRAMP program will have seven broad responsibilities.
With cyber skills in high demand, military and General Schedule pay scales can\'t possibly compete with industry paychecks. The Air Force hopes to compete by letting airmen make a career out of cyber.
Brendan Sasso, a staff writer covering technology for the Hill newspaper, said Sens. John McCain (R-Ariz) and Kay Bailey Huchison (R-Texas) are criticizing the comprehensive bill for putting too much emphasis on regulations rather than promoting information sharing.
Lt. Gen. Bill Lord, the chief information officer of the Air Force, spoke with Federal News Radio\'s Jason Miller at the recent AFCEA Air Force IT Day in Vienna, Va.
ManTech is solidifying its cybersecurity skills and offerings with the purchase of HB Gary.
The National Institute of Standards and Technology released the first draft of special publication 800-53 revision 4 yesterday.
Pat Howard, the chief information security officer at the Nuclear Regulatory Commission, joined In Depth to discuss NRC\'s cybersecurity efforts.
The Smarter Alliance Initiative found holes in its cyber defenses, and says that international cooperation is the best way to fix them.
The Homeland Security Department has been hunting down federal computers infected with the DNSChanger virus. The virus intercepts messages and sends victims to rogue web sites.
The National Security Agency has developed a better — and more economical approach — to fighting malware. Eric Chudow, a technical director for government mitigations in the NSA\'s Information Assurance Directorate, joined In Depth with Francis Rose to discuss the new method.
Security professionals see Bring-Your-Own-Device as an avenue for loss of enterprise data.
The National Institute of Standards and Technology says there are six steps agencies should take. NIST issues new guidelines for securing wireless local area networks, or WiFi.
A new FCC report finds the providers have the power to crack down on attacks like botnets, domain name fraud and IP address hijacking.