Sri Lanka Information Communication Technology Agency (ICTA) has launched a national CERT (Computer Emergency Response Team) to act as the focal point for Cyber security for the nation.
Lawmakers have urged President Obama to expand the State Department\'s cyber authority.
NASA has a mandate to manage computer risks in real time.
The National Institute of Standards and Technology and the Homeland Security Department\'s Science and Technology directorate are teaming up with the private sector to improve the cybersecurity of financial services.
The military\'s use of personal identifiable information places service members at a higher risk of identity theft than the population at large.
The administration detailed a 25-point plan to improve the way agencies buy and manage technology. Current and former government officials say OMB is using lessons learned from the past to set the agencies up for success.
Former intelligence CIO Dale Meyerrose discusses the top cyber stories of the year.
Dec. 14th, 10:00 am Cyber-threats have created unprecedented technical and social challenges that have never before been addressed. In the past, when the enemy attacked you could see it, touch it and know what damage was incurred. A cyber-bullet can attack a country, a financial institution, or a power grid and we may not be able to detect or ever know or understand the full impact of the security breach. What are the issues that the public is facing due to cyber-threats? What progress is being made in regards to cyber-security? Join us for a discussion with experts in the field of CyberSecurity to learn about this tough subject and what we need to do to stay vigilant against cyber threats and attacks.
Center for Internet Security\'s Steve Piliero discusses his group\'s study on cybersecurity metrics.
Even worse, they\'re getting more sophisticated too.
Computer software targeted by Stuxnet is used in US infrastructure but the virus does not appear to have affected any systems in the United States, a US cybersecurity official said Tuesday.
The agencies sign a MOU to work more closely on research and development on new technologies to protect the financial services sector\'s critical infrastructure. This agreement follows a pilot DHS and DoD have been working on to share threat information.
\"We want to protect the end user and we don\'t want them to care if it was antivirus or personal firewall; you want to protect them in a broader scheme,\" says ISCA Labs.
Demand for vendor-furnished information security products and services by the U.S. federal government will increase from $8.6 billion in 2010 to $13.3 billion in 2015 at a compound annual growth rate (CAGR) of 9.1%. INPUT\'s John Slye explains why.
IBM has a new tool to spot security vulnerabilities even while they\'re being written.