Previous attempts at developing a national cyber incident response plan have petered out. Now, with the threat greater than ever, government and industry must come together to draft a plan that addresses the myriad issues confronting cyber defense.
Following the distressing headlines that cataloged repeated cyber breaches of U.S. federal computer networks—some that compromised the personal data of millions of people—government officials have implemented a patchwork of safeguards to shore up vulnerabilities, including the identification of high value assets. An OMB memo gives agencies a multi-step plan, but it might not go far enough.
Hazards abound in safeguarding cyberspace, including the defense acquisition process. But some sacred cows may have to be slaughtered to help protect the defense network environment.
The ubiquity of networked devices has opened up a host of new opportunities for hackers aiming at targets from medical records to automobile GPS systems.
Having proper cyber hygiene is helping close the gap between security measures and hacker activities, but new threats continue to emerge.
Cybersecurity awareness is too important to be left to just one month of enhanced attention. Government, industry and nongovernmental organizations all can engage in just a few specific steps that would enhance cybersecurity significantly.
Small businesses doing work for the U.S. Defense Department pose serious cybersecurity concerns, in part because of their limited resources to invest in technical and practiced security measures, the U.S. Government Accountability Office stated in a recent report about small businesses cyber practices.
Government not only has been lax in following its own cybersecurity standards but also has failed to set the right example for the public sector and provide the proper resources to enable broad-based cyber protection.
The Office of Small Business Programs acknowledges that cybersecurity is an important and timely issue for small businesses and is considering incorporating cybersecurity into its existing outreach and education efforts
The presidents of the United States and China reach a historic agreement aimed at limiting cyber crime.
Security software soon may do more than just defend networks: it may reach out and engage the cyber intruder. But, this holds many pitfalls for those who would go after the cyber marauder.
The United States needs to adopt an information sharing model based on those of the National Weather Service and the Centers for Disease Control to address the changing nature of the cyberthreat.
Strong legal issues must be addressed before companies take cyber active defense into their own hands.
New cyber crime facility provides enhanced operational and training capabilities to meet the growing cyber mission.
The "Great Technical Glitch of July 8" shut down institutions that represent the economy (NYSE), transportation (United Airlines) and communications or freedom of speech (The Wall Street Journal). Not to go all X Files on you, but...
The recent failures of government information technology security point out the need for a new cyber service model, which features accountability and liability for the provider.
Our problem with cybersecurity is we are spending billions of dollars on prevention and enforcement and not enough on education. Sound familiar?
The FBI’s Internet Crime Complaint Center (IC3) has identified CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses.
On the final day of the AFCEA Defensive Cyber Operations Symposium in Baltimore, DISA officials wooed industry, stressing the need for cooperation and partnership to tackle the toughest problems faced by today’s warfighters.
Command and control of military networks takes center stage at the AFCEA Defensive Cyber Operations Symposium.