Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
IBM is creating a new security division — and has just announced a deal to help make it happen.
The chairman of the House intelligence committee says U.S. firms are afraid to come forward because they fear their computers would be the targets of even more attacks.
In a declaration, President Barack Obama noted the government\'s continued efforts to secure networks and information, respond to cyber incidents and protect critical information infrastructure.
The information was on computer tapes that weren\'t encrypted according to federal standards.
Karen Scarfone, one of the authors of the Wireless LAN publication, shares highlights from the guidance.
Auditors find all 24 agencies it reviewed had weaknesses in security controls. GAO also found problems with training and oversight of contractor systems. It recommends OMB and DHS provide better performance metrics.
October 5th, 2011 How far have we come and what are our biggest challenges—and opportunities—ahead as Cybersecurity comes of age? Hear what Lt. General Harry Raduege. Jr. and Karen Evans have to say about this compelling discussion.
Cyber criminals are increasingly netting big-fish victims by using a technique called \"whaling\" — a targeted spear phishing attack that aims for large organizations.
NIST has four new publications on improving cybersecurity.
The global market for such products is expected to grow by 44 percent a year before reaching some $3 billion in 2016.
The Justice Department drags its feet when reporting cyber incidents and does not have cyber incident reports from all of its departments, according to an Office of the Inspector General report.
The outgoing chief of staff for U.S. Cyber Command said recently the military\'s professional cyber corps has strong, diverse capabilities.
Authorities around the world are rounding up the members of the hacking groups LulzSecurity and Anonymous. Dozens of arrests have been made so far.
So-called typo-squatters take advantage of human fallibility by creating fake or spoof web sites that come up under common misspellings. Usually the sites are just a nuisance. But now, typo-squatting has taken a dangerous turn.
Weekly interviews with federal agency chief information officers about the latest directives, challenges and successes. Follow Jason on Twitter. Subscribe on Apple Podcasts or Podcast One.