More cybersecurity jobs are being added to the D.C. region every day. Jon Lau, Director of the Center for Cybersecurity for UMBC Training Centers, tells host Tom Temin how his university is trying to help fulfill that need. December 23, 2010
Jon Lau is the program manager for engineering and information technology at the UMBC, where they are meeting the growing need for cybersecurity professionals.
The contractor joins the growing number of companies adding cybersecurity capabilities.
Paul Henry, security analyst for Lumension, kicked off my 2011 Predictions series today.
The former employee planted a virus in the agency\'s network the day he was fired
The Commerce Department recommended forming the office as part of a framework for ensuring online data privacy.
During her remarks, Secretary Napolitano underscored the Department\'s efforts to protect federal civilian networks, improve the nation\'s intrusion detection capabilities, and create more robust and resilient cyber systems that are better equipped to prevent and withstand attacks.
Secretary of State Hillary Rodham Clinton on Wednesday unveiled a reorganization plan for the State Department that include a new coordinator for cyber security.
Cyber activity has evolved over the years from worms and viruses to cyber crime and, now, to state-engaged cyber attacks that author Richard Stiennon calls “cyberwar.” Stiennon’s new book, “Surviving Cyberwar,” outlines a defense against…
Hacktivism, cyber war and social engineering tactics expected to be among the most widely-used methods for spreading encrypted and dynamic malware
Microsoft patches 40 vulnerabilities in Windows, Internet Explorer (IE), Office, SharePoint and Exchange, including nine pegged \"critical.\"
The Navy\'s Fleet Cyber Command said a lack of real-time visibility into their computer networks is a problem. A new operations center opening this week at Ft. Meade will let technicians see cyber attacks as they are happening.
The Center for Internet Security is trying to establish universal metrics for cybersecurity functions. We talk with Steve Piliero, the chief technology officer of CIS. December 9, 2010
A competition to find a replacement for one of the gold-standard computer security algorithms used in almost all secure, online transactions just heated up.