Cybersecurity

August 3, 2012
By Beverly Schaeffer

What you CAN'T see CAN hurt you. In this case, it's wireless intrusion by unauthorized devices. The U.S. Departments of Homeland Security and Defense are hot on the trail to ramp up detection and amp up protection.

August 2012
By Rita Boland, SIGNAL Magazine

The Defense Information Systems Agency's Host-Based Security System is evolving to handle today's wide range and high number of cyberthreats as well as to accommodate the prevalence of emerging mobile platforms. With a new contract in place, the experts who employ the system to keep networks safe will train more often in realistic scenarios, preparing them for attacks that would disrupt operations.

August 2012
By Max Cacas, SIGNAL Magazine

A significant modernization effort underway across the national electric grid is seeking a balance between strong cybersecurity capabilities and affordable protections across the sector.

August 2012
By George I. Seffers, SIGNAL Magazine

A new technology aimed at finding unauthorized wireless devices on critical infrastructure networks could be fielded within a matter of months.

August 2012
By George I. Seffers, SIGNAL Magazine

U.S. officials attending a United Nations meeting this month will try to sway other nations to agree to a set of international norms of behavior in the cyber realm. The U.S. approach is at odds with that preferred by Chinese and Russian officials, who argue that new treaties or international codes are needed for cyber.

June 28, 2012
By George Seffers

Quanterion Solutions Incorporated, Utica, New York, is being awarded a $26,978,011 cost-plus-fixed-fee, indefinite-delivery/indefinite-quantity contract to provide research and development and non-personal services to include information collection, processing management, analysis, dissemination, and other associated activities necessary in maintaining and operating the Cyber Security Information Analysis Center's scientific and technical information repository. The location of the performance is State University of New York Institute of Technol

June 18, 2012

Sandia National Laboratories is actively seeking partners to conduct research in the newly opened Cybersecurity Technologies Research Laboratory (CTRL). The CTRL offers the capability to run experiments and freely discuss a wide range of cyber research issues.

June 8, 2012
By Beverly Schaeffer

In the world of cybersecurity, the problem is not the threat to, but the vulnerability of, the Internet to breaches. The question is whether this reality can be conveyed successfully to the populace. What do you think is the key to solving these kinds information-age challenges?

April 30, 2012
By George Seffers

EmeSec Incorporated, Reston, Virginia, recently announced that it has been awarded a $1.3 million follow-on contract with the U.S. Air Force Medical Services (AFMS) Office of the Chief Information Officer's Information Assurance Division. The company will focus on providing information assurance (IA) engineering services for a variety of systems and applications supporting 74 Air Force sites. Additionally, the company will deliver certification and accreditation service support.

March 30, 2012
By Rachel Eisenhower

Although outside adversaries constantly attempt to gain access to U.S. Defense Department networks, cybersecurity leaders within the Marine Corps agree that internal user errors and attempts to skirt security measures pose the biggest threat.

March 29, 2012
By George Seffers

Military communications officials struggle with the temptation to ignore warfighters' unauthorized use of cutting-edge mobile devices. It's not always easy to enforce the U.S. military's rules on the use of mobile devices, said John Wilcox, U.S. Special Operations Command.

February 29, 2012
By Maryann Lawlor

Amazing anecdotes kept the audience entertained during the lunch session at the AFCEA International Homeland Security Conference. The experts were speaking about a serious subject: cyberwar. But the stories about their hands-on experience in learning how to fight cyberwars, how they've fought cyberthreats and what they believe is needed to prepare future cyberwarriors kept conference attendees enthralled.

February 29, 2012
By Maryann Lawlor

In a time when government agencies and industry must tighten their belts, it may be a cloak that saves the security day. AFCEA International Homeland Security Conference, panelist Tim Kelleher, vice president of professional services, BlackRidge Technology, shared details about his company's approach to stopping cybermarauders in their recon tracks.

February 28, 2012
By Maryann Lawlor

Although not claiming victory, the DHS has made some serious headway in improving cybersecurity, according to panelists discussing the topic at the DHS 2012 Information Technology Industry Day in Washington, D.C. Experts said the threats have not disappeared but rather have changed, and various DHS agencies have been learning how to better handle them.

December 23, 2011
By Beverly Schaeffer

Imitation is the sincerest form of flattery, but that's not always the case in cyberspace-where malicious website impostors steal vital data from legit site users.

December 21, 2011
By Dan Barber

From securing the cloud to unwrapping new architecture compliance requirements, 2011 was a busy year for the tech public sector. In the New Year's spirit of renewal and rededication, here are 5 resolutions federal agencies should make.

December 2, 2011
By Prenston Gale

Thousands of data breaches occur as a result of internal information leakage rather than an outside attack. There is a critical need to further educate government personnel on how to keep sensitive information secure. Guest blogger Prenston Gale weighs in with insight on how to achieve this important goal.

October 26, 2011

One of the government's premier scientific research institutions is focusing its resources on defending computer systems against cyberattackers. The Sandia National Laboratories has concluded a recent two-day conference on cybersecurity by announcing plans for a new Cyber Engineering Research Institute (CERI) that will have a presence on both Sandia campuses in New Mexico and California.

October 20, 2011

(ISC)², the not-for-profit information security professional body that administers the Certified Information Systems Security Professional certification, announced this week the winners of its eighth annual U.S. Government Information Security Leadership Awards.

September 8, 2011

Cybercrime legislation should be technology agnostic to ensure technological advances do not make the laws obsolete, says James A. Baker, deputy attorney general for the U.S. Justice Department. Baker testified before the Senate Judiciary Committee during a September 7 hearing on updating the Computer Fraud and Abuse Act to combat emerging cyberthreats.

Pages