Deputy Defense Secretary says information technology, and the world\'s reliance on it, has redefined the front lines of national security.
OMB created CyberScope to streamline the reporting process, enhance analysis, and importantly, reduce the $2.3 billion Feds spend annually on compliance. So why is no one using it? We ask McAfee\'s Ed White.
The Washington Business Journal reports that VRL is a privately-held cyber threat intelligence company. It will become part of CSC\'s global cybersecurity business.
In a first, the Department of Homeland Security launched its annual National Cybersecurity Awareness Month from two cities at the same time: Washington, D.C. and Seattle. Officials reminded government, industry and the general public about good cyber hygiene.
Alma Cole leads the SOC, tasked with cybersecurity for DHS and its component agencies.
Host Mark Amtower interviews Karen Evans, Director, U.S. Cyber Challenge, on cybersecurity issues. October 4, 2010
Tight security measures both tighten the leashes of executives, while driving them out of the office.
The Defense Department announced that Cyber Command did not achieve its October 1st deadline for being fully operational.
Stuxnet\'s inability to stay stealthy may be fall-out from a failure to hit its intended targets last year.
Harris Corporation has introduced a highly customizable USB thumb drive that quickly extracts targeted data from computers. The BlackJack™ is designed for military, intelligence, and law enforcement cyber security missions, where speed, stealth and accuracy are paramount considerations.
Congressman Jim Langevin (D-RI) has introduced the Strengthening Cybersecurity for Critical Infrastructure Act, which would allow the Administration to create a more robust set of regulations for the information systems that control our critical infrastructure.
National Cybersecurity Awareness Month officially kicks off today. In coming weeks, federal officials are expected to launch a number of public programs to raise awareness of the importance of securing the nation\'s computer networks for both government and private industry. But some officials also are using it as an opportunity to ask, \"Where will the cybersecurity workers of tomorrow come from?\"
Participants will also learn how to use the Internet safely and and prevent identity theft.