The White House launches a new initiative to better secure the computers that run critical infrastructure like power plants and water systems.
The Joint Authorization Board releases specific requirements around each of the security controls for FedRAMP for systems needing low and moderate security levels. GSA and IAC will hold an industry day Wednesday.
NIST says it wants to head off a threat that could lead to more sophisticated attacks on organizations.
Many agencies are now allowing employees to use their own smartphone devices. But the results of a survey by the National Cyber Security Alliance and McAfee found almost three-quarters of Americans do not have any security software or data protection applications installed on their smartphones.
Senate Majority Leader Harry Reid promised to bring up comprehensive cybersecurity legislation early on in 2012. Last year, there were more than 50 bills introduced in Congress, but they received little attention.
The General Services Administration wants vendors to provide proof that they are securing the agency\'s systems.
Energy Department wants to develop a cybersecurity maturity model grid operators can measure themselves against.
Obama, flanked by Defense Secretary Leon Panetta and Chairman of the Joint Chiefs of Staff Gen. Martin Dempsey, unveiled the results of an eight-month defense strategy review that is intended to guide decisions on cutting hundreds of billions from planned Pentagon spending over the coming decade. But the eight-page document contained no details about how broad concepts for reshaping the military will translate into troop or weapons cuts.
The President and the Pentagon gave the rough outlines Thursday for how they plan to create a lean, but still effective military. Ground forces will shrink, capabilities in cyber, ISR, technology will grow.
The Defense Information Systems Agency has granted approval for Android-based mobile devices to connect to DoD networks, provided they\'re secured using a specific set of guidelines
Dan Kent, the chief technology officer for Cisco Systems\' Federal Organization, joined Industry Chatter to discuss the uses and limits of cloud computing, and its various models, at federal agencies.
Defense Appropriations Bill signed by President Obama gives the Defense Department the ability to conduct cyber attacks.
Request for information covers maintenance of all joint staff networks and applications, and ensuring the network is secure through risk management mitigation, network vulnerability analysis and security auditing.
Hacker group, called Private-X, breached the Office of the Vice President site and the Philippine Nuclear Research Institute.
The acquisition is Raytheon\'s second cybersecurity related buy this month and the 10th since 2007.