Nextgov - Cybersecurity Report on the Battle to Protect Data & Systemsen-usWed, 22 Oct 2014 17:43:11 -0400Cyber Policy Still Stuck in the ‘90s the nearly 20 years since the first cyber policy discussions, technology has changed tremendously. The debate hasn’t caught up yet.Jessica Herrera-Flanigan Wed, 22 Oct 2014 17:43:11 -0400 - Cybersecurity ReportMaksim Kabakou/Shutterstock.comDo We Need to ‘Disrupt’ the Cybersecurity Status Quo? month marks 10 years since DHS first marked Cybersecurity Awareness Month. Is the cyber conversation stuck in 2004?Jessica Herrera-Flanigan Thu, 25 Sep 2014 16:41:17 -0400 - Cybersecurity ReportMaksim Kabakou/Shutterstock.comWill Obama's New Tech Squad Include Cyber Experts? Service team announcement didn’t mention privacy or security, while snoops continue targeting Internet users.Aliya SternsteinMon, 25 Aug 2014 17:27:36 -0400 - Cybersecurity ReportErika Cross/Shutterstock.comHow Cyber Scary Is It Outside Today?'s new iPhone app measures threat levels for every sector and dissects daily hacks.Aliya SternsteinWed, 16 Jul 2014 17:15:07 -0400 - Cybersecurity ReportSenate Defense Bill Unearths NSA ‘Sharkseer’ Program want to drop $30 million on an obscure National Security Agency cybersecurity program.Aliya SternsteinWed, 28 May 2014 14:41:13 -0400 - Cybersecurity Reportm00osfoto/Shutterstock.comHHS, DHS and EPA Don’t Need to Dole Out New Cyber Rules measures will suffice, the White House has concluded.Aliya SternsteinThu, 22 May 2014 16:15:37 -0400 - Cybersecurity ReportWhite House Cybersecurity Coordinator Michael DanielAnn Heisenfelt/APUSPS Employees Get Fake USPS Phishing Emails, Too's an inside peak at what happens next.Aliya SternsteinWed, 21 May 2014 17:52:00 -0400 - Cybersecurity ReportPaul Sakuma/AP file photoLawmakers Say Favored NSA Reform Bill Doesn’t Go Far Enough members want to insert an amendment barring the agency from exploiting zero day flaws.Frank KonkelThu, 15 May 2014 08:16:00 -0400 - Cybersecurity ReportPatrick Semansky/AP file photoFCC Employees, Is Your Internet Running Sluggish Today? website operators are slowing FCC staff's access to their sites in protest of potential paid Internet fast lane regulations.Aliya SternsteinWed, 14 May 2014 15:47:37 -0400 - Cybersecurity ReportMembers of US advocacy groups camp outside FCC headquarters in Washington, DC, on Jan. 30, 2014Kevin Wolf/AP Feds: You Need to Fix Your TSP Passwords This Weekend federal retirement program website is changing its policy to stop giving identity thieves clues about how to crack employee passwords.Aliya SternsteinWed, 07 May 2014 16:22:21 -0400 - Cybersecurity ReportBruce Rolff/Shutterstock.comIntel Firm Links Ukraine Energy Debt With Potential Cyber Assault Future drilled into a wide range of Web data to create a speculative timeline of potential network attacks.Aliya SternsteinFri, 02 May 2014 17:19:31 -0400 - Cybersecurity ReportRussian President Vladimir PutinMikhail Klimentyev, Presidential Press Service/APCybersecurity May Be Going the Way of Country Music many of us are starting to do the equivalent of changing the dial.Jessica Herrera-Flanigan Mon, 28 Apr 2014 16:35:33 -0400 - Cybersecurity ReportCountry music artist Toby KeithChris Pizzello/Invision/APOne Chart Shows Why You Shouldn’t Trust the Feds With Your Data number of reported information security incidents involving personally identifiable information has more than doubled in recent years.Ross Gianfortune and Katherine McIntire PetersThu, 03 Apr 2014 14:08:39 -0400 - Cybersecurity ReportSergey Nivens/Shutterstock.comOp-Ed: Agency IT Budgets Aren’t Keeping Pace with Malware Threat lawmakers don’t increase IT budgets, agencies will have to sacrifice some of their cybersecurity initiatives.Mohamad Elbarasse, immixGroupThu, 20 Mar 2014 15:37:34 -0400 - Cybersecurity ReportPavel Ignatov/Shutterstock.comThe Internet of Things Means More Things to Hack's great that more everyday items have online capabilities, but it's also a whole new world of cyber vulnerability.Jessica Herrera-Flanigan Fri, 14 Mar 2014 16:34:03 -0400 - Cybersecurity ReportHigh-tech, Wi-Fi-connected trash cans are placed around London to monitor commuters. Lefteris Pitarakis/APRussia's Holding Back Cyber Capabilities in Ukraine'If Russia really wanted to deal a devastating blow . . . they could have definitely done it.'Aliya SternsteinMon, 10 Mar 2014 17:07:14 -0400 - Cybersecurity Reportvagant/Shutterstock.comFour Federal Cyber Escapades to Watch For This Spring request hints at novel approaches cyber threats; details to come at congressional hearings.Aliya SternsteinWed, 05 Mar 2014 16:26:31 -0500 - Cybersecurity ReportMaksim Kabakou/Shutterstock.comDropbox Addresses Government Spying policy lays out the service's 'government request principles.'Aliya SternsteinFri, 21 Feb 2014 17:03:34 -0500 - Cybersecurity ReportFlickr user babybenOp-Ed: Three Steps That Would Significantly Improve Cybersecurity’s no need to wait for Congress to act -- there are important things we could do right now.Robert DixFri, 14 Feb 2014 11:02:41 -0500 - Cybersecurity Report igor.stevanovic/Shutterstock.comDHS Hires Booz to Finish Cyberattack Drill Job awarded contract extension after department fell behind on the Cyber Storm project.Aliya SternsteinThu, 13 Feb 2014 17:11:04 -0500 - Cybersecurity ReportUnited States Customs and Border Protection file photoThe FBI Is in the Market for Malware specific organization in need is the FBI Investigative Analysis Unit of the Operational Technology Division.Aliya SternsteinTue, 04 Feb 2014 17:41:13 -0500 - Cybersecurity ReportPavel Ignatov/Shutterstock.comOp-Ed: It’s Time to Take Action on Cybersecurity adversaries aren’t standing idly by while we get our defenses in order.Frank Cilluffo and Sharon CardashTue, 04 Feb 2014 08:00:00 -0500 - Cybersecurity ReportMaksim Kabakou/Shutterstock.comData Breach Epidemic: Why Are We Blaming the Victims? question going forward is what is the proper standard for protecting data, especially without the existence of universal technical, operational, and policy standards?Jessica Herrera-Flanigan Wed, 29 Jan 2014 11:36:01 -0500 - Cybersecurity ReportTarget experienced a massive data breach in 2013.ValeStock/Shutterstock.comAgencies to Focus on Illegal Cyberweapons Trade in 2014 bill calls for agencies to work together on guidelines.Aliya SternsteinFri, 20 Dec 2013 10:22:53 -0500 - Cybersecurity Report fixer00/Shutterstock.comWhite House's $14 Billion Cyber Spending Claim Is Squishy administration's 2014 governmentwide computer security budget has two line items -- cyber IT and cyber non-IT activities -- neither of which has a dollar figure attached.Aliya SternsteinFri, 08 Nov 2013 08:40:46 -0500 - Cybersecurity ReportAdam Parent/