Cybersecurity

Can DHS get it together?

Slowly but surely, the agency's ability to handle cybersecurity has evolved -- but experts say key hurdles remain.

Cybersecurity

IARPA unveils work on predictive intelligence

The Intelligence Advanced Research Projects Activity held its first industry day Oct. 30, and in doing so underlined predictive intelligence as a priority.

Cybersecurity

NIST spells out information-sharing best practices

A draft document from the National Institute of Standards and Technology aims to improve agencies’ sharing of cyber threat information.

Cybersecurity

Are the White House Hackers Gone?

There's a possibility the unnamed attacker is still there.

Cybersecurity

Florida Clinic Refuses to Pay Computer Hostage-takers

Healthcare and Public Health // Florida, United States

Cybersecurity

NSA Chief Warns Companies Against Revenge Hacking

"Hacking back" may be illegal, Michael Rogers said. But his advice doesn't apply to the agency he heads.

Cybersecurity

Assessing the White House breach

The breach apparently affected only unclassified networks, but the White House is revealing few details.

Digital Government

British Spies Allowed to Access U.S. Data Without a Warrant

Newly released documents from the British government reveal a lack of judicial oversight for how it sifts through communications data collected by the NSA and other foreign governments.

Cybersecurity

Feinstein, Chambliss: We can pass a cyber bill during lame duck

The chair and ranking member of the Senate Intelligence Committee say they've addressed privacy and liability concerns, and predict both chambers can move cyber legislation after the election.

Cybersecurity

Cape May-Lewes Ferry Hit by Payment Card Breach

Retailer // Delaware, United States

Modernization

Here Are Six Nearly Certified Cloud Services Waiting in the Wings

A new list of “RedRAMP Ready Systems” is meant to make it easier for agencies to comply with security controls.

Cybersecurity

Death of the password? Not just yet.

Considerable skepticism persists about digital identity verification, according to a Forrester Research brief.

Cybersecurity

The Army's new approach to cyber

The Cyber Battle Lab exemplifies a multifaceted model for cyber and electronic warfare.

Cybersecurity

Cyber E-Book Turns Spotlight on Threat Vectors

The “Emerging Threats: Assessing 2014 Attack Vectors” explores the threat landscape for five different areas.