The Wounded Warrior Project is a new collaboration among Raytheon, Cisco - it offers wounded veterans a chance to learn computer and cybersecurity skills. Bob Connors, project director, talks with Federal News Radio about the details.
China hijacked fifteen percent of Internet traffic across the globe. Nobody noticed, except for some cybersecurity experts. They may have also had access to data from U.S. military, civilian organizations and those of other U.S. allies.
Raytheon and Cisco are joining up to expand the Wounded Warrior Project. The programs they are sponsoring make it easier for wounded servicemen and women to re-enter the workplace with the skills they need to become cybersecurity professionals.
Chertoff wants to see the nation\'s cyber defense increased, telling the BBC that cyberspace is just as integral to our nation\'s security as ground, sea and air warfare.
Fidelity Investments slashes its stake in Sourcefire
The service is giving careful thought to the human side of the cybersecurity equation. The top commander of the Air Force\'s Space Command said it\'s no longer a matter of information assurance, and it\'s all about mission assurance.
Despite constant alerts and tips to avoid phishing scams and other viruses, Americans still expose themselves to harm.
An International Cyber Range for realistic assessments of cyberwarfare scenarios is being developed.
Chris Johnson oversees the National Vulnerability Database at the National Institute of Standards and Technology. He is Tom Temin\'s guest this week on Federal Security Spotlight. November 11, 2010
Basic training at Lackland Air Force Base, Texas, now includes two sections on being a good \"cyber wingman\" and taking care of the network, and the Air Force Academy now offers a cybersecurity major.
Lessons learned from frequent attacks make banks good role models in defending against bad guys
Cloud computing and security – you never hear one talked about without the other. In a new report, Allan Friedman, a fellow at the Brookings Institution, explores how to think about privacy and security in the cloud. He argues the real weak link in security is the human factor. For this reason, Friedman tells Federal [...]
To prevent third parties from secretly accessing visitor data, websites are now limiting tracking technologies.
An activist investor is reportedly pushing for Symantec to split into a security business AND a data storage business.
Northrop Grumman, the nation\'s largest security contractor has joined forced with the University of Maryland Baltimore County to launch a new cybersecurity program.