From “Dramatic Changes Coming in Endpoint Security” by Jack Gold of J. Gold Associates: There is a significant change coming to endpoint security, with dramatic implications for how end users will be protected and what…
Funding priorities include malware, insider threats, and ways to support the Comprehensive National Cyber Initiative.
\"Detonating\" file copies in a sandbox to examine whether any document contains malicious content stops malware before it can enter your network.
Navy isseus contracts to examine the science, architecture, engineering, functionality, interface and interoperability of cyberspace operations systems, services and capabilities at the tactical, operational and strategic levels.
About half the students graduating with degrees in science and engineering are Chinese and Indians who will eventually return to their countries, according to Rep. Roscoe Bartlett.
A new program will target high school students in the government\'s search for the next generation of cyber warriors. Lawmakers hope the U.S. Cyber Challenge will help attract and train much needed experts in cybersecurity.
Obama administration officials are considering relaxing some security requirements for cloud computing certification to expedite deployments.
As people share more data electronically and boost their use of mobile applications, they\'re becoming more vulnerable to cyberattacks.
The agency\'s monthly security report to Congress continues to show a decreasing severity of data breaches.
DHS is in the final stages of deploying version 2 of Einstein across the government, and already is making plans for version 3.
An event this week sponsored by Potomac Institute in Arlington, Va., evaluates government\'s cyber spending priorities.
The Federal Bureau of Investigation announced it had issued more than 40 search warrants throughout America as part of the ongoing investigation \"into recent coordinated cyber attacks against major companies and organizations.\"
The first of what should be a slew of bills aimed at safeguarding government IT has been introduced.
Secretary Janet Napolitano said the Einstein 3 software will be deployed across the government to detect and disrupt malicious cyber activity. Cybersecurity among the hot topics Napolitano highlighted during her State of Homeland Security address.
Cisco\'s 2010 Annual Security Report is just out. Cisco\'s Patrick Peterson joins Federal Security Spotlight with the details. January 27, 2011