Defense Systems
Cyber intel sharing bill moves through House
The first two cybersecurity bills being considered in the House during "Cyber Week," CISPA and the Federal Information Security Amendments Act, passed April 26; two more bills are also up for consideration.
Defense Systems
Iran switches to the offensive in cyber war, panel says
The United States has a number of enemy nations. But one in particular should have the U.S. watching its back, a panel of experts said during a House hearing.
Defense Systems
Move over military, infrastructure: Cyber criminals take aim at new target
The greatest international threat today is not to military targets or critical infrastructure, according to Estonian President Toomas Hendrick Ilves. So just what does have the bull's-eye on its chest?
Defense Systems
Is continuous security monitoring worth the payoff?
Moving to a risk-management model of cybersecurity with continuous monitoring of systems can be difficult on a tight budget, but if done right, the savings can make it all worth the work.
Defense Systems
Insider threats defense plan in the works, but will it work?
The FBI and ODNI are leading the initiative to develop a national policy on insider threats expected by year's end. However, it will take more than fancy technology to do the job.
Defense Systems
DOD vs. DHS: Who should mind the US' cyber defense?
A Senate budget hearing on the Defense Department's Strategic and Cyber commands became a duel over how the nation's cybersecurity should be structured.
Defense Systems
3 factors inhibit DOD cyber infrastructure defense
House and Senate budget hearings focused on defining DOD's role in defending a largely civilian cyberspace, and on the challenge of recruiting and retaining the workforce it needs.
Defense Systems
R&D funding on the rise in 2013 budget proposal
Spending for scientific research and development, including clean energy, bio and nano research and education, would increase under the president's 2013 budget proposal.
Defense Systems
Cybersecurity research feels the love in 2013 budget request
Cybersecurity is identified as a priority for basic research in the president's budget request for fiscal 2013, with large investments proposed for DOD, DHS and NSF.
Defense Systems
US cyber defense highly vulnerable to attack: Clarke
Former presidential adviser Richard Clarke says cybersecurity has been static in both the public and private sectors and adds that "if someone wants to get into your network, they can get in."
Defense Systems
DOD on the hunt for hacker hires
Hacker turned DARPA program manager Mudge returned to his roots at the Black Hat Briefings to announce a new program to fund small-scale hacker research.
Defense Systems
DOD cyber strategy model for civilized warfare
DOD's strategy for operating in cyberspace contained few surprises, but it should help quiet concerns of those worried that the strategy goes too far -- or not far enough.
Defense Systems
Lawmakers oppose cybersecurity legislation committee
With many committees claiming jurisdiction over cybersecurity, little progress has been made on passing comprehensive legislation. Sen. John McCain's call for a temporary select committee to break the logjam quickly met with resistance.
Defense Systems
Hackers target Booz Allen military e-mails
The AntiSec hacking campaign claims it downloaded 90,000 military e-mails and password hashes from unsecured systems at government contractor Booz Allen Hamilton and released the hijacked files.
Defense Systems
DOD proposes safeguarding unclassified data
Proposed additions to the Defense Federal Acquisition Regulations System would require contractors to provide minimum security for unclassified but controlled DOD information in their systems.
Defense Systems
RSA verifies its tokens played role in Lockheed cyberattack
The complicated attack might have used log-in data obtained via a phishing attack along with algorithm seed numbers taken from RSA to generate new passcodes.
Defense Systems
RSA tokens thought to be behind second defense contractor hack
Information that could enable attackers to break the RSA SecurID token is believed to have been used in attacks against major defense contractor L-3 Communications, which followed a similar breach against Lockheed Martin.
Defense Systems
Hackers move quickly to exploit bin Laden news
Hackers are taking advantage in the spike in Internet traffic following news of the death of Osama bin Laden with malicious links and sites. One national security expert warns that a cyber response to the death is not unlikely.
Defense Systems
US-Russian academics at work on cyber dictionary
The Critical Terminology Foundations provides definitions for 20 key cybersecurity concepts agreed upon by U.S. and Russian contributors, which is called a "first step for creating international cybersecurity agreements."
Defense Systems
As cyber landscape evolves, so do the bad guys
A pair of cybersecurity studies show how hackers and criminals adroitly adapt to a shifting IT environment while systems defenders stand still.
Almost There!
Help us tailor content specifically for you: