The Center for Strategic and International Studies teams up with security company McAfee to conduct a survey on cyberthreats facing critical infrastructure enterprises across seven sectors of the economy in 14 nations. Keep Reading
The Financial Services ISAC plans a simulated cyber attack against a range of its members in February to test their responses.
When President Obama last month named Howard Schmidt to be the nation's cybersecurity coordinator, he filled a gap in the federal government's cybersecurity command structure. Schmidt joins a group of IT decisionmakers who share responsibility for keeping Uncle Sam's systems, information, and IT infrastructure safe from threats that are growing in number and sophistication.
Just days after serving subpoenas to two travel bloggers, the Transportation Security Administration withdrew the subpoenas late Thursday, saying its investigation into how the bloggers received a sensitive security directive "is nearing a successful conclusion."
Naming of Howard Schmidt as cyber czar draws universal praiseKeep Reading
Former Bush official steps into familiar roleKeep Reading
Specialists discuss challenges of attaining unified cyberdefense capability. Keep Reading
OMB to follow up on incomplete submissionsKeep Reading
Congress holds hearings on methods to prevent terrorist attacks on a number of fronts in the wake of the Fort Hood attack earlier this month. The Senate Judiciary Committee examines cybersecurity; the House Homeland Security Committee takes a look at protecting federal civilian buildings; and the Senate Homeland Security and Governmental Affairs Committee investigates conditions that enabled the Fort Hood attack to occur. Keep Reading
Federal IT professionals report frequent cybersecurity lapses.
DHS Deputy Undersecretary Phil Reitinger talks up DHS cybersecurity at a software forum at the George Washington University; DHS Assistant Secretary Greg Schaffer discusses SCADA cybersecurity in Idaho; and NPPD officials go to Sweden to discuss cybersecurity internationally. Keep Reading
GAO questions DHS' dedication to sector-specific plansKeep Reading
Poll finds cyberthreat frightens public more than terror attacks or home burglary. Keep Reading
DHS sponsors meeting of experts to probe frontiers of security for 'smart infrastructure' networks. Keep Reading
Continues an ongoing assessment of DHS programs and offices Keep Reading
As new devices and platforms come on line, they bring new vulnerabilities to hacking and attacks—but developers and researchers are also looking ahead to the next generation of digital defenses.Keep Reading
Despite progress, a comprehensive assurance solution for sensitive IT data remains elusive. Keep Reading
At a time of unprecedented financial volatility, protecting transactions has taken on new importance—and developers are trying to stay one step ahead of savvy criminals and terrorists. Keep Reading
' ... are still not executing all of the department's policies, procedures and practices' Keep Reading
'It is a critical challenge ... we are largely failing at doing well' Keep Reading