Search

Search results

  1. Cybersecurity Information Sharing a Tool for Situational Awareness

    ... Internet Security and Rich Struse with the DHS talk about cybersecurity and information sharing at Homeland Security Conference. Knowing the cybersecurity threat might be half the battle toward mitigating problems, but ...

    Sandra Jontz - 03/10/2015 - 15:39 - 0 comments

  2. NSA Announces Cybersecurity Contest

    ... National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Scientific papers must have been ... the paper must exemplify the performance and reporting of cybersecurity scientific research. The competition was created to stimulate ...

    Maryann Lawlor - 02/24/2015 - 12:01 - 0 comments

  3. DHS Readies Next Phase of Cybersecurity Conformity

    ... a new thrust in which it addresses a growing concern of cybersecurity: identity management. The program aims to drive the overhaul of ... Diagnostics and Mitigation (CDM) program seeks to fortify cybersecurity of government networks and systems against the trillions of cyber ...

    Rachel Lilly - 03/02/2015 - 09:58 - 0 comments

  4. Government Cybersecurity Research Explores Technological, Human Capabilities

    ... of the emerging Internet of Things, provides its own unique cybersecurity challenges. And, the near future may see individuals making chips ... is cyber. Frincke admits that many different aspects of cybersecurity are important for the agency. Research efforts must take into ...

    Rachel Lilly - 03/02/2015 - 10:03 - 0 comments

  5. Internet of Things Might Pose Even Greater Cybersecurity Risks

    ... March 10, 2015 By Sandra Jontz As if cybersecurity of late has not been tough enough, the emergence of a ubiquitous ... that surprisingly little consideration is being paid to the cybersecurity of this phenomenon,” reads a portion of the report , written ...

    Sandra Jontz - 03/10/2015 - 10:13 - 0 comments

  6. Northrop Awarded Cybersecurity Contract Modification

    ... for risk management framework. Contractor will meet cybersecurity requirements using the new Risk Management Framework. Work will ... Acquisition and Contracting Tags:  Cybersecurity Air Force Contract Awards ...

    George Seffers - 02/20/2015 - 16:54

  7. From Dominating in Synthetic Biology to Fielding Undersea Drones, DARPA Sets Future Priorities

    ... the information explosion and create a new trajectory for cybersecurity. “Today, the way we pursue cybersecurity, all we have is patch and pray,” Prabhakar says. “And we ...

    Sandra Jontz - 03/26/2015 - 12:56 - 0 comments

  8. White House Creates New Cybersecurity Intelligence Agency

    ... it is creating a federal agency to keep tabs on and counter cybersecurity threats against the United States. The Cyber Threat Intelligence ... The $35 million agency comes on the heels of cybersecurity legislation proposed by President Barak Obama during his State ...

    Sandra Jontz - 02/11/2015 - 14:07 - 0 comments

  9. Social Engineering Scams Puncture Global Cybersecurity Efforts

    ... up against issues compounded by disparate national laws and cybersecurity expertise, experts say. Many European nations remain a key ... resources for victims to report crime, more training for cybersecurity experts, better information sharing procedures and legislation ...

    Sandra Jontz - 02/25/2015 - 15:35 - 0 comments

  10. Guest Blog: A Brief Look into the Cybersecurity Framework

    ... a well-established company or one just getting started with cybersecurity risk management programs, those in the industry often can use a ... to clarify existing guidance and help organizations manage cybersecurity risk. The National Institute of Standards and Technology ...

    Rachel Lilly - 01/16/2015 - 18:25 - 0 comments

Pages