You will be redirected to the page you want to view in  seconds.


  1. Rep. Mike Rogers warns that the U.S. is not ready to go on the cyber offensive. Chip Somodevilla/Getty Images

    U.S. not ready to launch offensive cyber attacks, charges Congressman

    As a House committee drafts a policy for cyber action, it remains uncertain that it will become effective anytime this year.

    • Oct. 1, 2014
  2. John Streufert, whose division leads DHS's CDM Program, said some agencies have strong diagnostic tools in place, while others have nothing. Mike Morones/Staff

    CDM brings new complexity to agency networks

    Continuous data monitoring is an advance for security, but making sense of the data can challenge agency capabilities.

    • Sep. 29, 2014
  3. Phyllis Schneck: Building trust is a crucial component of cybersecurity. Rob Curtis/Staff

    DHS cyber chief emphasizes resiliency, building trust

    Cybersecurity is part of homeland security, says Phyllis Schneck, leader of the National Protection and Programs Directorate.

    • Sep. 26, 2014
  4. A hole discovered in the GNU Bash shell code used in Linux and UNIX-based systems shows a critical vulnerability that allows an intruder to add malicious code. Colin Kelly/Staff

    New critical vulnerability could give hackers control of systems, networks

    Computers and networks running Bash such as Linux and Mac OS X are exposed to a new, critical weakness.

    • Sep. 25, 2014
  5. A new round of pilot projects can help foster a marketplace of online identity solutions, says Jeremy Grant, senior advisor at NIST and head of NSTIC's national program office. NIST

    $2.8M in grants awarded to online ID pilot programs

    Projects will focus on easy and secure methods for verifying identities online.

    • Sep. 23, 2014
  6. America's critical infrastructure, such as bridges, water supplies and electricity, is at risk from cyber attacks. Justin Sullivan / Getty Images

    Clock ticking to comment on NIST's cybersecurity framework

    The framework is meant to be a flexible tool for reducing cyber risks.

    • Sep. 22, 2014
  7. Adm. Michael Rogers: Preventing or stopping intruders is only half of the equation for maintaining resiliency. Mark Wilson/Getty Images

    IT security shifts from prevention to resiliency

    True cybersecurity is about 'our ability to sustain damage and still achieve mission outcomes.'

    • Sep. 22, 2014
  8. Many mobile users will sacrfice security for convenience, survey shows. Getty Images/iStockphoto

    Convenience trumps security for many mobile users

    Survey shows one-third of employees have mobile devices used exclusively for work.

    • Sep. 22, 2014
  9. Some of the greatest security threats come from people with authorization to access sensitive information. Army

    How to detect an insider threat

    You can spot high-risk employees and contractors without disrupting the office, but it takes some finesse.

    • Sep. 17, 2014
  10. DHS' Suzanne Spaulding testified to the Senate that the agency's cybersecurity center has processed over 612,000 cyber incidents so far this fiscal year. BRENDAN SMIALOWSKI/AFP/Getty Images

    Racy celebrity pics and the federal cloud

    Security breach exposing private photos renews security fears.

    • Sep. 15, 2014
  11. The Recovery Accountability and Transparency Board, which is employing a variety of cloud-based services, provides oversight of all federal funding, such as a multibillion-dollar military construction program at 11 Army and Air Force installations in Georgia and North Carolina, above. Army Corps of Engineers

    Agencies work to recover from cyber attacks

    The focus turns to resilience as 100-percent prevention proves to be impossible.

    • Sep. 15, 2014
  12. Lee Hamilton, former Congressman and co-chair of the 9/11 Commission, says cyber attacks are a greater threat to national security than insurgent groups such as ISIS. Drew Angerer/Getty Images

    Hamilton: Cyber attacks pose greater threat than ISIS

    The former 9/11 Commission vice-chairman argues that the U.S has not done enough to protect its networks.

    • Sep. 12, 2014
  13. Sen. Tom Carper points to recent hacking incident as a sign of the urgent need to update laws. (James J. Lee / Army Times) James J. Lee / Army Times

    Hacker loaded malware onto server

    System intruder did not steal personal information, officials say.

    • Sep. 5, 2014
  14. A former acting HHS cyber official has been convicted of child pornography offenses. Sheila Vemmer/staff

    Former HHS acting cyber chief convicted of child porn offenses

    Timothy Defoggi is the sixth person convicted in an FBI crackdown.

    • Aug. 28, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit today!