The 2010 iteration of the RSA Security Conference which opens Monday in San Francisco will feature an impressive array of influential government heavyweights among its featured keynote speakers.
The Bipartisan Policy Center sponsored a wargame called the Cyber Shockwave, which demonstrated to leaders last week that the federal government might not have the authority to properly respond to a massive cyber attack.
Researchers highlight 25 most common bugs exploited by cyber-criminals.
Massive helium-filled blimps known as “aerostats” have been a fixture in the skies over the Texas-Mexico border since at least the early 1990s. Authorities use them to provide long-term surveillance of illegal immigration and drug-trafficking.Keep Reading
Author of US policy review looks at past year of cybersecurityKeep Reading
The White House's proposed fiscal 2011 budget would continue to finance the National Cybersecurity Center, intended to be the operations hub for cyber defense efforts at the Department of Homeland Security.
Research paper explores analogies between 1950s civil defense and current cybersecurity challenges.
National intelligence director outlines diverse array of emerging global security challenges
The Center for Strategic and International Studies teams up with security company McAfee to conduct a survey on cyberthreats facing critical infrastructure enterprises across seven sectors of the economy in 14 nations. Keep Reading
The Financial Services ISAC plans a simulated cyber attack against a range of its members in February to test their responses.
When President Obama last month named Howard Schmidt to be the nation's cybersecurity coordinator, he filled a gap in the federal government's cybersecurity command structure. Schmidt joins a group of IT decisionmakers who share responsibility for keeping Uncle Sam's systems, information, and IT infrastructure safe from threats that are growing in number and sophistication.
Just days after serving subpoenas to two travel bloggers, the Transportation Security Administration withdrew the subpoenas late Thursday, saying its investigation into how the bloggers received a sensitive security directive "is nearing a successful conclusion."
Naming of Howard Schmidt as cyber czar draws universal praiseKeep Reading
Former Bush official steps into familiar roleKeep Reading
Specialists discuss challenges of attaining unified cyberdefense capability. Keep Reading
OMB to follow up on incomplete submissionsKeep Reading
Congress holds hearings on methods to prevent terrorist attacks on a number of fronts in the wake of the Fort Hood attack earlier this month. The Senate Judiciary Committee examines cybersecurity; the House Homeland Security Committee takes a look at protecting federal civilian buildings; and the Senate Homeland Security and Governmental Affairs Committee investigates conditions that enabled the Fort Hood attack to occur. Keep Reading
Federal IT professionals report frequent cybersecurity lapses.
DHS Deputy Undersecretary Phil Reitinger talks up DHS cybersecurity at a software forum at the George Washington University; DHS Assistant Secretary Greg Schaffer discusses SCADA cybersecurity in Idaho; and NPPD officials go to Sweden to discuss cybersecurity internationally. Keep Reading
GAO questions DHS' dedication to sector-specific plansKeep Reading