Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Search Tags: Cybersecurity
Sens. Lieberman, Collins and Carper's legislation creates two new offices to oversee federal cybersecurity in DHS and the White House. It also forms a new Federal Information Security Taskforce made up of agency chief information security officers. Bill does not include "kill switch" provision for private sector networks.
Bill would put DHS in charge of all civilian networks
Learn more in today's cybersecurity update.
After Google hack, warnings pop up in SEC filings
This week, Federal Security Spotlight talks with John Streufert of the State Department.
June 10, 2010
The challenge of securing the nation's IT infrastructure has often been likened to building an airplane as it flies through the air -- or even herding cats.
Tags: In Depth , Francis Rose , technology , cybersecurity , DHS , Richard Marshall , National Cybersecurity Division , ISC2 , FBI , HP , Electronic Data Systems , Howard Schmidt , Barack Obama , Max Cacas
Bradley Manning was detained during a tour of duty in Iraq.
Google denies use of private data, Adobe warns of critical security flaw in its products
The U.S. Cyber Command - or CYBERCOM - officially became operational in late May. But observers inside the military and out still aren't sure what the command is supposed to do: protect the Pentagon's networks, strike out at enemies, seal up civilian vulnerabilities, or some combination of all three. CYBERCOM officials insist they have no interest in taking over the security of the Internet, but Pentagon officials have floated the idea the Defense Department might start a protective program for civilian networks.
Carnegie Mellon University's Computer Emergency Response Team (or CERT) has released a new fuzzing framework that will help identify and eliminate security vulnerabilities from different kinds of software. The fuzz testers are used by security researchers to find vulnerabilities by sending random input to an application. Fuzz testing has been popular among hackers, but with the release of this framework, CERT can push businesses to subject all software to fuzz testing.