The Pentagon’s new cybersecurity strategy for the first time publicly addresses the department’s option to resort to offensive cyberwarfare tactics as a means to safeguard the military’s information networks. The Department of Defense Cyber Strategy, the second in four years, guides the development of the military’s cyber forces.
Cybersecurity has become a mission of equal importance to the Department of Homeland Security as combating terrorism, Secretary Jeh Johnson shares at the RSA Conference 2015 in California.
Do you have unique personal identification numbers (PINs) for all of your passwords? If you answered no, create a priority “to do” and investigate password vaults, accessible from your mobile devices and web browser.
Modern commercial airliners could be at risk of in-flight cybersecurity attacks through a vulnerability posed by passengers using planes’ wireless systems, warns a federal watchdog agency.
Welcome to the security world, where agencies worry about cyber attacks from the outside as much as from the inside. Guest blogger Ed Bender highlights some surprising results from a recent survey in which respondents lament the insider threat; both from those who intend harm and those who inadvertently invite it.
On the same day that news headlines implicated Russian hackers in a significant cyber attack and breach on the White House, officials attending a cybersecurity summit Tuesday in the nation’s capital warned of the uptick in the number of nation state-sponsored cyber attacks against the U.S. government and businesses.
Cybersecurity is not one of the attractive career fields that tend to draw job seekers in droves to job fairs, especially among today’s young people now entering the work force, experts say.
The U.S. Army’s newly created cyber school is prepared to accept its first class of second lieutenants this summer followed by enlisted personnel and warrant officers.
New methods of teaching cybersecurity might be the best hope for providing the necessary security experts to turn the tide against malicious cybercriminals who have launched constant battles against vital networks.
Experts today trumpet the very same warnings voiced two years ago, when then Vice President Dick Cheney’s heart implant drew public attention and fervor to the mounting warnings of lax cybersecurity on wireless medical devices, some worn and some implanted inside the body.
As if cybersecurity of late has not been tough enough, the emergence of the ubiquitous network consisting of billions of Internet connections and smart gadgets presents an alarming security threat that has failed to draw a concerted effort by experts—both in the government and industry—to address the weaknesses and protect users, experts say.
Recruiting for a qualified military and civilian workforce for the U.S. Defense Department's cybersecurity mission has proven successful so far, but retaining the force remains to be seen, cyber commanders told Congress during a hearing.
You can reduce the probability of a cyber attack from a disgruntled employee by becoming more mindful of your command climate or employee attitudes and making a commitment to spending more time with your employees/members of your command.
The European Union faces the same formidable increase in cyber attacks as the United States—but comes up against issues compounded by disparate national laws and cybersecurity expertise, experts say. While technology might lead to some of the security lapses, humans certainly contribute to the problem.
The National Security Agency’s third annual Best Scientific Cybersecurity Paper competition is now open. Deadline for submissions is March 31.
The three sea services are facing different challenges with cyber operations, but they are adopting some similar solutions as they wrestle with the newest warfighting domain.
The U.S. government-backed cybersecurity framework for the nation’s federal agencies and critical infrastructure sector—released one year ago today—has received a general thumbs up of approval from industry experts, who say the NIST guideline is proving a successful advent toward a better understanding of cyber risks and organizations’ vulnerabilities.
The U.S. Navy is exploiting its own assets and other capabilities to defend and protect against cyberthreats. Some of these internal assets include automated triggers in networks as well as advanced intelligence sources.
The U.S. Navy is facing new and better cyber adversaries as it expands its own cyber footprint. These threats face the fleet and the nation, and the Navy may be called upon to respond in both cases.
The U.S. Navy is focusing on five long-term goals in its cyber operations that involve other service and national assets.