The National Security Agency is now on the case of a cyber attack carried out against the NASDAQ stock exchange in October. The attacks are believed to be more extensive than initially reported. The NSA’s…
The Pentagon is finalizing a new cyber warfighting strategy that will create a framework for training and equipping forces.
The head of U.S. Cyber Command says cloud computing is part of his plan for staying ahead of the cyber threats that face the Defense Department. “A year from now we should be well on our way to having a hardened architecture proven and in place, which provides a new level of cybersecurity,” said General [...]
Gwynne Kostin, director of Mobile, Office of Citizen Services & Innovative Technologies of GSA, explains how employees can overcome some of the biggest challenges to mobile technologies.
Technologies developed for federal government may have been used to \"harm U.S. citizens on behalf of clients in the private sector.\"
NASA\'s internal computer network is full of holes and vulnerable to a cyberattack, an audit by the Office of the Inspector General has found.
The cyber security industry needs workers, and is expected to see a shortage as the industry grows. The Baltimore Business Journal reports that the Anne Arundel Workforce Development Corp is going to try to help.…
The National Security Agency tests a new IT architecture for securing data on mobile devices.
The Department of Homeland Security says cyber attacks against the federal government jumped by 40 percent last year.
Based on new figures, the military expects to spend more than three times what DHS is requesting for cyber operations.
The agency will issue its first Call Letter of 2011 Friday detailing suggestions for insurance carriers to focus on wellness and healthy lifestyles. Director Berry also wants insurance providers to offer affinity benefits for domestic partners of federal employees. Later this year, OPM will launch a new medical claims database to improve the plans.
Sentrigo\'s flagship product, Hedgehog Enterprise, monitors databases for illegal or unauthorized activity.
So what are the cyber challenges facing the Naval Postgraduate School?
How bad is the hacking of RSA for the federal government? We ask CERIAS\'s Gene Spafford.
Gen. Keith Alexander has outlined a series of next steps to be pursued by the six-month-old U.S. Cyber Command.