You will be redirected to the page you want to view in  seconds.


  1. System admin sentenced for hacking Navy database

    Former Navy nuclear systems administrator gets two years for exposing information of 222,000 personnel.

    • Nov. 24, 2014
  2. Matt Goodrich, FedRAMP manager at GSA, leads the team that approves cloud providers, such as Microsoft Office 365, as secure vendors. Colin Kelly / Federal Times

    Microsoft 365 first cloud email to gain FedRAMP approval

    With ATO, partner InfoReliance will start migrating Health and Human Services' email to the cloud.

    • Nov. 21, 2014
  3. Mark Norton (left), DoD senior systems engineer, said derived credentials won't replace CAC but will simplify sending secure emails on mobile devices. Thomas Brown/Gannett Government Media Corp

    Derived credentials to roll out across DoD by July 2015

    The credentials allow mobile devices to send secure emails without need for a common access card to authenticate the user.

    • Nov. 21, 2014
  4. Phase II of the Continuous Diagnostics and Mitigation program builds on the identity, credential and access management side of cybersecurity, including personal identity verification cards (shown) and authentication. Kendra Fulton/ / Air Force

    CDM Phase II centers on monitoring user privileges, activities

    'Least privilege and infrastructure integrity' is the watchword for the latest cybersecurity push.

    • Nov. 17, 2014
  5. The State Department is the most recent federal agency to admit to a breach of its cyber networks. Wikimedia Commons

    State Department hit in cyberattack that also compromised White House

    State Department's email system shut down this weekend to shore up affected network.

    • Nov. 17, 2014
  6. Veteran Affairs CIO Stephen Warren noted that all veteran data compromised in October was the result of human error, not cyberattacks. Colin Kelly/Staff

    Cybersecurity about people, not technology, VA numbers show

    Leaks of personally identifiable information are more likely to come through lost devices or mishandled paperwork than hacking attempts.

    • Nov. 17, 2014
  7. Rep. Elijah Cummings, D-Md., sent letters to several private corporations asking for details on recent cyber breaches. Win McNamee/Getty Images

    Rep. Elijah Cummings requests details on private industry data breaches

    Ranking member of Oversight Committee looking for information to help steer government policy.

    • Nov. 12, 2014
  8. Creating information sharing groups around cyberattacks can help prevent future breaches and mitigate damage from intruders. Cotton Puryear

    NIST weighs pros and cons of cyberattack data-sharing

    Draft guide to sharing information on cyber breaches is open for public comments.

    • Nov. 11, 2014
  9. U.S. Postal Service networks were breached, potentially leaking significant, sensitive information about employees, as well as some customer data. Kevork Djansezian/Getty Images

    Cyber attack exposes personal information of 800K Postal Service employees

    Intrusion compromised important employee data, including Social Security numbers, and some consumer information.

    • Nov. 10, 2014
  10. Illegal e-commerce sites hide from law enforcement on the 'Dark Web.' Getty

    Police take down Dark Web markets around the globe

    Police in 17 countries arrested at least 17 website administrators, vendors and cybercriminals in a massive operation.

    • Nov. 7, 2014
  11. OPM seeks to learn the 'DNA of the federal cybersecurity workforce,' says Lucy Antone. SAUL LOEB / AFP/Getty Images

    Cybersecurity codes being added to all federal job descriptions

    OPM looking to have every position coded by the end of 2015.

    • Nov. 7, 2014
  12. Brendan Goode, a key figure in the Einstein program, to leave DHS

    The department confrms that Goode will leave for the private sector later this month.

    • Nov. 7, 2014
  13. Minor deficiencies add up to significant weaknesses at SSA

    Social Security Administration's annual cybersecurity audit shows progress but more is needed.

    • Nov. 5, 2014
  14. An Inspector General review of Energy Department's systems showed persistent cybersecurity issues. Sheila Vemmer/staff

    IG: Energy Department systems exposed by critical weaknesses

    Annual cybersecurity report shows some progress but a number of significant deficiencies.

    • Nov. 4, 2014
  15. Lt. Gen. Kenneth Minihan is the former director of the National Security Administration and the Defense Intelligence Agency.

    Federal mobile platforms need newer, stricter protocols

    The marriage of mobile and cloud requires a new approach to security.

    • Nov. 3, 2014
  16. Lua is designed to allow teams to communicate in a secure environment. Lua

    Mobile efficiency and security: Finding the balance

    The days of mobile as an afterthought are long past, but agencies still struggle to make implementations user-friendly yet still secure.

    • Nov. 3, 2014
  17. A survey of government IT professionals finds that training to prevent cyber security threats is an investment priority for more than 60 percent of federal civilian and defense/military organizations. Fort Meade Alliance

    Survey: Cybersecurity priorities shift to insider threats

    Federal IT decision-makers now more concerned with 'misuse' than malware.

    • Nov. 3, 2014
  18. Kshemendra Paul, program manager for the Information Sharing Environment, in Washington, D.C., on Wednesday, September 4, 2013. (Mike Morones/Staff) Mike Morones/Staff

    The ISE at 10

    Information sharing is a problem that is never solved, but the government's ambitious attempt, launched in the wake of 2001's terror attacks, has taken some big strides.

    • Nov. 3, 2014
  19. Sens. Dianne Feinstein and Saxby Chambliss have urged the U.S. Chamber of Commerce to push for a cybersecurity bill. Alex Wong/ / Getty Images

    Charm Offensive: Senate intel leaders push for US Chamber's help on cyber bill

    Feinstein, Chambliss bring a bipartisan plea to the chamber's Washington headquarters.

    • Oct. 30, 2014
  20. 'I'm not interested in anybody writing a blank check for US Cyber Command or the National Security Agency,' said ADM Mike Rogers, who heads both groups. Mark Wilson / Getty Images

    NSA chief: 'I don't want privacy information'

    As industry and privacy advocates fret about cybersecurity legislation, cyber leader seeks to reassure.

    • Oct. 29, 2014
  21. The FBI and Naval Criminal Investigative Service suspect bad actors have used social networking sites to lure get the personal information of government employees, military personnel or defense contractors. FBI

    'Spear-phishing' tactics becoming more sophisticated

    Targeted attempts to trick people into revealing useful information are at the heart of many advanced persistent threats.

    • Oct. 24, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit today!