Advertisement

You will be redirected to the page you want to view in  seconds.

 Cyber

  1. DHS' Suzanne Spaulding testified to the Senate that the agency's cybersecurity center has processed over 612,000 cyber incidents so far this fiscal year. BRENDAN SMIALOWSKI/AFP/Getty Images

    Racy celebrity pics and the federal cloud

    Security breach exposing private photos renews security fears.

    • Sep. 15, 2014
  2. The Recovery Accountability and Transparency Board, which is employing a variety of cloud-based services, provides oversight of all federal funding, such as a multibillion-dollar military construction program at 11 Army and Air Force installations in Georgia and North Carolina, above. Army Corps of Engineers

    Agencies work to recover from cyber attacks

    The focus turns to resilience as 100-percent prevention proves to be impossible.

    • Sep. 15, 2014
  3. Lee Hamilton, former Congressman and co-chair of the 9/11 Commission, says cyber attacks are a greater threat to national security than insurgent groups such as ISIS. Drew Angerer/Getty Images

    Hamilton: Cyber attacks pose greater threat than ISIS

    The former 9/11 Commission vice-chairman argues that the U.S has not done enough to protect its networks.

    • Sep. 12, 2014
  4. Sen. Tom Carper points to recent hacking incident as a sign of the urgent need to update laws. (James J. Lee / Army Times) James J. Lee / Army Times

    Hacker loaded malware onto Healthcare.gov server

    System intruder did not steal personal information, officials say.

    • Sep. 5, 2014
  5. A former acting HHS cyber official has been convicted of child pornography offenses. Sheila Vemmer/staff

    Former HHS acting cyber chief convicted of child porn offenses

    Timothy Defoggi is the sixth person convicted in an FBI crackdown.

    • Aug. 28, 2014
  6. The Defense Department has long used the Common Access Card to verify identity. However, civilian agency adoption was nearly nonexistent before 2011, according to federal documents. DoD

    Cards emerge as key player in authentication

    The venerable password has become the weakest link in the security chain.

    • Aug. 26, 2014
  7. Security vulnerabilities endanger NOAA's Joint Polar Satellite System. NOAA illustration

    NOAA struggles to fix vulnerabilities in satellite program

    Security weaknesses put polar satellite ground system at risk.

    • Aug. 26, 2014
  8. Vijay Basani is co-founder and chief executive officer of EiQ Networks, a pioneer in simplified security and compliance solutions. He has built successful businesses delivering enterprise-class solutions that transform how organizations identify threats, mitigate risks and enable compliance. Courtesy Photo

    First things first: secure the core

    The indictment of foreign generals by a U.S. grand jury highlights the scale and severity of cyber-espionage and attacks on critical industrial and governmental entities.

    • Aug. 25, 2014
  9. The recent Heartbleed malware attack reminds cybersecurity experts of the need to understand how asserts are being protected, says Michael Daniel, Special Assistant to the President and White House Cybersecurity Coordinator. Mike Morones/Staff

    Cybersecurity's many moving parts

    White House cybersecurity chief Michael Daniel talks risk and response.

    • Aug. 25, 2014
  10. CANES allows the Navy to address some unsustainable operating systems on legacy networks, said RDML Christian Becker. Rick Naystatt

    CANES contract opens new phase for the program

    The next-generation network gathers steam toward full operation.

    • Aug. 22, 2014
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit industrycircle.com today!