Threats
State Department and White House Networks Hacked at the Same Time
The breaches have forced officials to take down the State Department's unclassified email system for repairs, disrupting email traffic and access to public websites. By Aliya Sternstein
Science & Tech
The Next Big Thing To Fight Hackers? Self-Healing Computers
Homeland Security networks should be able to not only detect hackers and throttle their destructive tactics -- but also robotically bounce back. By Aliya Sternstein
Science & Tech
Navy Launches ‘Task Force Cyber Awakening’
The Navy is embarking on a year-long effort to protect hardware and software across the service. By Aliya Sternstein
Science & Tech
Should We Put Robots in Charge of Cybersecurity?
Most network intrusions can be traced back to human error. Are robots the answer? By Aliya Sternstein
Threats
China Wants To Replicate NSA’s Cyber Schools
About 60 Chinese schools are interested in incorporating the NSA’s cyber education program in their curriculums. By Aliya Sternstein
Business
Would Pay Scales Close the Cybersecurity Workforce Gap?
A better understanding of what cybersecurity professionals do, along with implementing a graduated pay scale, could be two big steps in the right direction. By Aliya Sternstein
Business
What to Expect From Obama's Resurgent Intel Advisory Panel
The president's Intelligence Advisory Board had only 4 members a year ago. Will the panel's 6 new appointees hit the ground running? By Aliya Sternstein
Science & Tech
Pentagon Satellite Maker Ignoring 'Thousands' of Major Cyber Vulnerabilities
Raytheon blasted for ignoring 'high-risk' vulnerabilities to weather satellites shared by government agencies. By Aliya Sternstein
Science & Tech
Foreign Government Agents Suspected of Hacking U.S. Nuclear Regulator
Malware and phishing campaigns compromised the computers of at least a dozen U.S. workers at the Nuclear Regulatory Commission with a technique the Chinese and Russians have used before. By Aliya Sternstein
Science & Tech
Behind the High Tech Forensics of Malaysian Airlines Flight MH17
Dutch officials in charge of identifying survivors explain the difficult task of matching the missing with surviving family members. By Aliya Sternstein
Policy
The CIA Can’t Hack Senate Computers Because They Own Them, Experts Say
It’s not hacking because the CIA provided the system, network drive, search tool and classified documents for the Senate. By Aliya Sternstein
Science & Tech
Federal Computers Could Be Infected By Invisible Malware
Media sites are more likely to be infected by malware than enterprise networks, according to a new report. By Aliya Sternstein
Threats
Getting on a U.S. Military Base Will Now Include an FBI Background Check
In the wake of the Fort Hood and Washington Navy Yard shooting, the Defense Department will now check IDs against the FBI’s criminal database. By Aliya Sternstein
Threats
Obama Requests Drone Surge for U.S.-Mexico Border
President Obama has requested an escalation of aerial surveillance along the border with Mexico -- including 16 more drone crews at a cost of nearly $40 million. By Aliya Sternstein
Business
Should You Need a License to Practice Cybersecurity?
The United States should consider a certifying body to grant and revoke permissions for cybersecurity professionals, a National Defense University professor says. By Aliya Sternstein
Business
Are Paychecks the Problem? Senate Considers Bonuses for Pentagon’s Cyber Workforce
The private sector is eating the Pentagon’s lunch when it comes to skilled workers. A Senate panel wants to know if bonuses and incentives will make a difference. By Aliya Sternstein
Science & Tech
How Oculus Will Revolutionize the Battlefield
On the battlefield, Oculus will feed live data from defense networks into the headgear. By Aliya Sternstein
Threats
Industry Needs To Do More To Protect the Power Grid From a Cyber Attack
A new paper from the Bipartisan Policy Center recommends creating an industry-led group to do more to prevent cyber attacks on the electric grid. By Aliya Sternstein
Science & Tech
Hackers Target VFW Website
Researchers say the attack was timed to coincide with last week's snowstorm. By Aliya Sternstein
Business
Lost Your CAC Card? Prove It, Says the Pentagon
In a new rule, DOD will require troops and employees wanting a replacement ID to provide certified proof that they lost their common access card. By Aliya Sternstein
Almost There!
Help us tailor content specifically for you: