Cybersecurity

Army cyber unit guards computer networks

The Army's Cyber Command, which reports to the overall Cyber Command, is now fully operational.

Cybersecurity

Inconsistent policies trip up efforts to track terrorist finances

Interagency and global collaboration are critical to following terrorist money, according to a forensics expert.

Cybersecurity

Defense cyber chief downplays need to resolve lines of authority

Defense and Homeland Security agreement is the first step.

Cybersecurity

GAO, DHS at odds on SBInet management

Homeland Security officials say the GAO didn't give a clear picture of how their agency's handling the program to secure the U.S. border.

Cybersecurity

FEMA has gaps in disaster IT systems, IG says

The Federal Emergency Management Agency has made moderate progress in most key areas since 2008 but still has weak spots in disaster preparedness, according to a new audit.

Cybersecurity

Expert Dialogue: The Cybersecurity Challenge

Expert Dialogues is your chance to engage in conversations with leading practitioners and observers on key issues surrounding the government's use and implementation of information technology

Cybersecurity

DHS used Facebook for investigations, group reveals

The Electronic Frontier Foundation has released two policy memos about a policy dating to the administration of President George W. Bush of "friending" and "following" people on Facebook and Twitter for the purpose of investigations.

Cybersecurity

Cyber czar: Threat protection is a shared responsibility

Government, the private sector and users all must work to protect networks.

Cybersecurity

Analysis: In Defense of FISMA

Implementing government's landmark cybersecurity statute should be more than just a paperwork drill.

Cybersecurity

Morphing threat landscape demands evolution in agency cyber battle planning

A Symantec executive supplies federal agencies with a few tips about the state of the cybersecurity universe.

Cybersecurity

Defense and DHS reach cybersecurity compromise

Agreement outlines personnel, tools and facilities tasked with protecting networks.

Cybersecurity

Encryption debate centers on privacy

Nations are grappling with the problem of how to protect online communications from threats such as censorship, spam that clogs networks and cyberterrorists.