OMB mandated departments implement continuous monitoring of their cyber networks by 2012. Part of meeting that goal is understanding what hardware and software currently reside on the computing backbone.
A Texas man who admitted hacking into the computer systems of a Minnesota company and NASA\'s Goddard Space Flight Center in Maryland pleaded guilty Wednesday to one count of wire fraud.
The Cyber Command is focused on achieving real-time capabilities, but the director of current operations said they still have serious work to do. He appealed to industry leaders for help designing a sufficient platform.
A group of computer hackers hijacked websites run by the Voice of America this week, sending its online traffic to an Internet website claimed to be run by the Iranian Cyber Army.
The Air Force wants to create a whole unit of non-existent identities on social media sites.
DoD is trying to figure out how to keep risks that one part of the organization takes from affecting the rest of the military\'s networks. DISA addressing other security goals by adding PKI to secret network.
A new cyber competition and conference have been designed to attract more students and young professionals to pursue careers in cybersecurity. SAIC\'s Larry Cox explains.
Internet attacks from hackers, spies and terrorist groups deserves serious attention, says Howard Schmidt, but this should not be \"to the extent of mass hysteria\".
No one should be allowed to shut down the internet in the United States. So says Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman.
Josh Stephens, vice president of Technology and Head Geek for Solar Winds, told the DorobekINSIDER that agencies\' tech shops need to embrace the change - not avoid it.
The Navy\'s cyber command will soon be able to see a real-time view of penetration attempts into the service\'s IT systems, the command\'s number two officer said Thursday.
OPM has completed a governmentwide cybersecurity survey to approximately 50,000 employees and their supervisors who handle cybersecurity as part of their daily job responsibilities.
GAO\'s biannual list includes 30 programs that are in trouble. House and Senate members promise to focus more of their attention on the initiatives most at risk. Members plan to use the model that worked for DoD and personnel security clearances in other problematic areas.
More than 100 foreign intelligence agencies have tried to crack the DoD computer networks.
Cybersecurity adds to a slight increase in federal IT spending proposed for FY 2012