You will be redirected to the page you want to view in  seconds.


  1. A Lockheed Martin employee working on a server in the NextGen Cyber Innovation and Technology (NCITE) Center in Gaithersburg. Fran Dries

    For cyber-defense, automation alone is not enough

    Human intervention is required to truly make networks secure.

    • Jul. 28, 2014
  2. James Clapper: A 'perfect storm' is making the U.S more vulnerable to terrorists. File

    Clapper: Terror threat is growing

    A 'perfect storm' or factors is making the nation more vulnerable, 10 years after the 9/11 Commission's report.

    • Jul. 25, 2014
  3. John Streufert, Director of Federal Network Resilience at DHS, said some agencies are further along than others in adoptiong CDM. Mike Morones/Staff

    DHS outlines new CDM task order agenda

    The Department of Homeland Security, aided by the General Services Administration's Federal Systems Integration and Management Center, has released the first request for quotation for Task Order 2 of its $6 billion Continuous Diagnosis and Mitigation init

    • Jul. 21, 2014
  4. DoD cyber exercise builds on National Guard's lead

    DHS, FBI take part in test drive of operational capabilities

    • Jul. 18, 2014
  5. Sen. Tom Carper points to recent hacking incident as a sign of the urgent need to update laws. James J. Lee / Army Times

    OPM hacking attack exposes weaknesses in cyber defense

    As investigators probe a March cyber attack on sensitive federal personnel databases, some experts and policy makers are calling for more clarity over who is responsible for protecting federal networks from cyber threats.

    • Jul. 14, 2014
  6. Report: Chinese hacked federal employee files

    Chinese hackers broke into the federal Office of Personnel Management computer system in March, apparently targeting tens of thousands of employees who applied for top-security clearance, The New York Times is reporting.

    • Jul. 10, 2014
  7. Biometrics use human traits, such as the unique characteristics of an iris, to identify a person rather than easier to forge credentials like usernames and passwords. Sgt. Michael J. MacLeod

    Can biometrics solve the identity management riddle?

    Biology-based ID tests are valuable, but bring their own challenges.

    • Jul. 9, 2014
  8. Maj Gen James K. 'Kevin' McLaughlin has been nominated to become deputy commander at U.S. Cyber Command. Air Force

    McLaughlin picked as CYBERCOM deputy commander

    The assignment would come with a promotion.

    • Jul. 9, 2014
  9. Admiral Michael Rogers, commander of US Cyber Command, director of the National Security Agency (NSA) and chief of the Central Security Service, speaks during the Armed Forces Communications and Electronics Association Cybersecurity Summit in Washington, DC, May 28, 2014. AFP PHOTO / Saul LOEB (Photo credit should read SAUL LOEB/AFP/Getty Images) SAUL LOEB / AFP/Getty Images

    Rogers: Cybersecurity is the 'ultimate team sport'

    After 90 days in office, CYBERCOM head shares first impressions.

    • Jul. 8, 2014
  10. Federal spending increased dramatically on security classification activities including declassification and technical surveillance countermeasures. JIM WATSON/AFP

    Price tag for security classifications jumps to $11.6B

    Declassification, countermeasures top the list of rising cost items.

    • Jul. 7, 2014
  11. The Federal Trade Commission is one of six small agencies GAO audited for cybersecurity measures. PAUL J. RICHARDS / AFP/Getty Images

    Some small agencies at high cyber risk

    A lack of required safeguards and security procedures increase the danger.

    • Jul. 2, 2014
  12. Lebanese supporters of the Shiite Hezbollah movement wave the Syrian flag. Social media is emerging as a tool for gathering information on global hotspots. Mahmoud Zayyat / Getty Images

    The new intelligence frontier?

    As an open-source information tool, social media could become invaluable.

    • Jul. 2, 2014
  13. Sanjeev 'Sonny' Bhagowalia: Information that no one acts on is just 'proud words on a dusty shelf.' Colin Kelly/Staff

    Striking a cyber balance between state, federal authorities

    Say you're a public utility and you're under cyber attack. Who do you call? Local authorities? State government offices? The feds? The best option isn't always clear, but it become moreso soon.

    • Jun. 27, 2014
  14. FITARA is a 'good bipartisan, bicameral piece of legislation,' says Sen. Tom Carper. Staff

    Senate panel passes procurement, cyber reform bills

    New FISMA would change compliance rules; FITARA tackles technology acquisition.

    • Jun. 25, 2014
  15. 'Cyber legislation remains a very important part of this journey,' says Adm. Michael Rogers, commander of US Cyber Command, director of the National Security Agency (NSA) and chief of the Central Security Service. SAUL LOEB / AFP/Getty Images

    Agency heads hash out critical infrastructure protection roles

    NSA, DHS, FBI sorting out who does what in cyber mission.

    • Jun. 24, 2014
  16. The most recent cyber-sharing legislation is a bipartisan bill from Sens. Dianne Feinstein, D-Calif., and Saxby Chambliss, R-Ga. but the Senate would need to act on it by August. Getty Images

    Lawmakers, industry optimistic for cyber bill

    Draft legislation includes authority for countermeasures.

    • Jun. 23, 2014
  17. John Streufert, Director of Federal Network Resilience at DHS, delivers the keynote address at the Federal Times Breakfast Series discussion about Federal Cybersecurity at the Ritz-Carlton Pentagon City in Arlington, VA on Wednesday, June 11, 2014. Mike Morones

    DHS to award continuous monitoring task orders

    Federal Network Resilience Division Director John Streufert on the $6 billion effort to secure public-sector networks against cyber threats

    • Jun. 23, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit today!