You will be redirected to the page you want to view in  seconds.


  1. A security firm's logo for the Sandworm vulnerability. The name and image derive from Frank Herbert's science-fiction novel Dune. iSIGHT Partners

    Microsoft-based systems at risk from 'Sandworm' vulnerability

    Security gap in Microsoft products has been used to breach an American university, systems in Europe.

    • Oct. 16, 2014
  2. The Army has made significant strides in areas such as assessing aptitude and establishing training and doctrine, but the build-up is not without challenges, according to Lt. Gen. Edward Cardon. Army

    Army wrestles with talent amid cyber force build-up

    The Army has made significant strides in areas such as assessing aptitude and establishing training and doctrine, but the effort comes with challenges.

    • Oct. 15, 2014
  3. The Obama administration is accelerating cybersecurity efforts within federal agencies and in the sectors responsible for critical infrastructure, said Michael Daniel, White House cybersecurity coordinator. Mike Morones

    White House working around cyber bill impasse

    The White House's top cybersecurity official said it's not more power the Obama administration is after it's getting organizations involved to head in the same direction.

    • Oct. 13, 2014
  4. The administration is seeking legislation that would make it easier for DHS to work with private companies to prevent breaches, said White House Cybersecurity Coordinator Michael Daniel. Mike Morones

    White House will push piecemeal cybersecurity bills

    White House changes strategy on passing cybersecurity legislation.

    • Oct. 10, 2014
  5. Michael Bruemmer is the vice president for Experian Data Breach Resolution.

    Data breaches: Be prepared or prepare to pay

    Experian's Michael Bruemmer explains how to prep your agency for a data breach.

    • Oct. 3, 2014
  6. DHS has been pushing for proactive scanning of agency networks, according to Deputy Undersecretary for Cybersecurity and Communications Phyllis Schneck. Rob Curtis/Staff

    New policy requires DHS to scan civilian systems

    OMB guidelines give Homeland Security power to perform regular security scans of other agencies.

    • Oct. 3, 2014
  7. Rep. Mike Rogers warns that 85 percent of critical networks are vulnerable. Chip Somodevilla/Getty Images

    U.S. not ready to launch offensive cyber attacks, says congressman

    As a House committee drafts a policy for cyber action, it remains uncertain that it will become effective anytime this year.

    • Oct. 1, 2014
  8. John Streufert, whose division leads DHS's CDM Program, said some agencies have strong diagnostic tools in place, while others have nothing. Mike Morones/Staff

    CDM brings new complexity to agency networks

    Continuous data monitoring is an advance for security, but making sense of the data can challenge agency capabilities.

    • Sep. 29, 2014
  9. Phyllis Schneck: Building trust is a crucial component of cybersecurity. Rob Curtis/Staff

    DHS cyber chief emphasizes resiliency, building trust

    Cybersecurity is part of homeland security, says Phyllis Schneck, leader of the National Protection and Programs Directorate.

    • Sep. 26, 2014
  10. A hole discovered in the GNU Bash shell code used in Linux and UNIX-based systems shows a critical vulnerability that allows an intruder to add malicious code. Colin Kelly/Staff

    New critical vulnerability could give hackers control of systems, networks

    Computers and networks running Bash such as Linux and Mac OS X are exposed to a new, critical weakness.

    • Sep. 25, 2014
  11. A new round of pilot projects can help foster a marketplace of online identity solutions, says Jeremy Grant, senior advisor at NIST and head of NSTIC's national program office. NIST

    $2.8M in grants awarded to online ID pilot programs

    Projects will focus on easy and secure methods for verifying identities online.

    • Sep. 23, 2014
  12. Many mobile users will sacrfice security for convenience, survey shows. Getty Images/iStockphoto

    Convenience trumps security for many mobile users

    Survey shows one-third of employees have mobile devices used exclusively for work.

    • Sep. 22, 2014
  13. America's critical infrastructure, such as bridges, water supplies and electricity, is at risk from cyber attacks. Justin Sullivan / Getty Images

    Clock ticking to comment on NIST's cybersecurity framework

    The framework is meant to be a flexible tool for reducing cyber risks.

    • Sep. 22, 2014
  14. Adm. Michael Rogers: Preventing or stopping intruders is only half of the equation for maintaining resiliency. Mark Wilson/Getty Images

    IT security shifts from prevention to resiliency

    True cybersecurity is about 'our ability to sustain damage and still achieve mission outcomes.'

    • Sep. 22, 2014
  15. Some of the greatest security threats come from people with authorization to access sensitive information. Army

    How to detect an insider threat

    You can spot high-risk employees and contractors without disrupting the office, but it takes some finesse.

    • Sep. 17, 2014
  16. DHS' Suzanne Spaulding testified to the Senate that the agency's cybersecurity center has processed over 612,000 cyber incidents so far this fiscal year. BRENDAN SMIALOWSKI/AFP/Getty Images

    Racy celebrity pics and the federal cloud

    Security breach exposing private photos renews security fears.

    • Sep. 15, 2014
  17. The Recovery Accountability and Transparency Board, which is employing a variety of cloud-based services, provides oversight of all federal funding, such as a multibillion-dollar military construction program at 11 Army and Air Force installations in Georgia and North Carolina, above. Army Corps of Engineers

    Agencies work to recover from cyber attacks

    The focus turns to resilience as 100-percent prevention proves to be impossible.

    • Sep. 15, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit today!