The Homeland Security Department plans to conduct a cyber network assessment survey for all levels of government.
China has bumped the United States as the most feared nation in cyberspace.
Even in a year in which the Stuxnet attack targeted critical infrastructure systems and attacks on grid operators rose dramatically, operators of critical infrastructure around the world took few steps to increase their cyber defenses, a new report found.
While most efforts at training on information security focus on what not to do, a new report recommends rewarding employees for keeping information secure.
A UMBC research park emerges as front line of defense in Cyberwars.
White House strategy gives the Commerce Department bureau the ability to bring industry, privacy, security and other experts together to develop policies and standards. The administration made it clear the private sector will lead the effort and the government is only creating a marketplace for these services.
Federal News Radio viewed a copy of the proposal that would codify DHS\'s role in overseeing civilian agency networks. The draft legislation would expand DHS\'s authorities to those that are similar to what DoD already has around cyber. It also would include new roles around acquisition, personnel and FISMA implementation.
\"We are not DHS. We are not DoD,\" says Jerry Horton, chief information officer at USAID.
Like natural ecosystems, the cyber ecosystem has many participants. DHS\'s Greg Schaffer explains how it all fits together.
In a move to control the contollers, criminal servers have been swapped for government servers to intercept communications between infected systems and the servers controlling them.
The United States is still \"hugely vulnerable\" to cyber attacks, but so are most other nations, a former chairman of the Joint Chiefs of Staff said Monday.
The Air Traffic Organization is in the middle of one of the largest pilots in government testing mobile computing devices. ATO CIO Steve Cooper said business organizations must have a valid need to use the devices. Cooper said ATO will test other mobile devices this spring.
Cyber-attackers could view a shutdown as the perfect opportunity to infiltrate government systems. ISC squared\'s Hord Tipton joins us with analysis.
IBM\'s report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. We get details from IBM\'s Kris Lovejoy.
Microsoft makes court documents public as part of battle to provide cloud services to the Interior Department. Google contends its Google Apps for Government offers more security than FISMA requires.