You will be redirected to the page you want to view in  seconds.


  1. Sens. Dianne Feinstein and Saxby Chambliss have urged the U.S. Chamber of Commerce to push for a cybersecurity bill. Alex Wong/ / Getty Images

    Charm Offensive: Senate intel leaders push for US Chamber's help on cyber bill

    Feinstein, Chambliss bring a bipartisan plea to the chamber's Washington headquarters.

    • Oct. 30, 2014
  2. 'I'm not interested in anybody writing a blank check for US Cyber Command or the National Security Agency,' said ADM Mike Rogers, who heads both groups. Mark Wilson / Getty Images

    NSA chief: 'I don't want privacy information'

    As industry and privacy advocates fret about cybersecurity legislation, cyber leader seeks to reassure.

    • Oct. 29, 2014
  3. The FBI and Naval Criminal Investigative Service suspect bad actors have used social networking sites to lure get the personal information of government employees, military personnel or defense contractors. FBI

    'Spear-phishing' tactics becoming more sophisticated

    Targeted attempts to trick people into revealing useful information are at the heart of many advanced persistent threats.

    • Oct. 24, 2014
  4. A security firm's logo for the Sandworm vulnerability. The name and image derive from Frank Herbert's science-fiction novel Dune. iSIGHT Partners

    Microsoft-based systems at risk from 'Sandworm' vulnerability

    Security gap in Microsoft products has been used to breach an American university, systems in Europe.

    • Oct. 16, 2014
  5. The Army has made significant strides in areas such as assessing aptitude and establishing training and doctrine, but the build-up is not without challenges, according to Lt. Gen. Edward Cardon. Army

    Army wrestles with talent amid cyber force build-up

    The Army has made significant strides in areas such as assessing aptitude and establishing training and doctrine, but the effort comes with challenges.

    • Oct. 15, 2014
  6. The Obama administration is accelerating cybersecurity efforts within federal agencies and in the sectors responsible for critical infrastructure, said Michael Daniel, White House cybersecurity coordinator. Mike Morones

    White House working around cyber bill impasse

    The White House's top cybersecurity official said it's not more power the Obama administration is after it's getting organizations involved to head in the same direction.

    • Oct. 13, 2014
  7. The administration is seeking legislation that would make it easier for DHS to work with private companies to prevent breaches, said White House Cybersecurity Coordinator Michael Daniel. Mike Morones

    White House will push piecemeal cybersecurity bills

    White House changes strategy on passing cybersecurity legislation.

    • Oct. 10, 2014
  8. Michael Bruemmer is the vice president for Experian Data Breach Resolution.

    Data breaches: Be prepared or prepare to pay

    Experian's Michael Bruemmer explains how to prep your agency for a data breach.

    • Oct. 3, 2014
  9. DHS has been pushing for proactive scanning of agency networks, according to Deputy Undersecretary for Cybersecurity and Communications Phyllis Schneck. Rob Curtis/Staff

    New policy requires DHS to scan civilian systems

    OMB guidelines give Homeland Security power to perform regular security scans of other agencies.

    • Oct. 3, 2014
  10. Rep. Mike Rogers warns that 85 percent of critical networks are vulnerable. Chip Somodevilla/Getty Images

    U.S. not ready to launch offensive cyber attacks, says congressman

    As a House committee drafts a policy for cyber action, it remains uncertain that it will become effective anytime this year.

    • Oct. 1, 2014
  11. John Streufert, whose division leads DHS's CDM Program, said some agencies have strong diagnostic tools in place, while others have nothing. Mike Morones/Staff

    CDM brings new complexity to agency networks

    Continuous data monitoring is an advance for security, but making sense of the data can challenge agency capabilities.

    • Sep. 29, 2014
  12. Phyllis Schneck: Building trust is a crucial component of cybersecurity. Rob Curtis/Staff

    DHS cyber chief emphasizes resiliency, building trust

    Cybersecurity is part of homeland security, says Phyllis Schneck, leader of the National Protection and Programs Directorate.

    • Sep. 26, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit today!