Cybersecurity

Camp trains future cybersecurity experts

National Public Radio

Cybersecurity

Photo of the Day

Yes, that's Sen. Tom Carper, D-Del., chairman of the Federal Financial Management, Government Information, Federal Services and International Security Subcommittee and <a href=http://techinsider.nextgov.com/2010/04/critical_agency_cyber_reports_prod_senate_action.php>author of cybersecurity bills</a>, standing next to a Nerf gun "modified to hold long-range antennas and a computer that can monitor data sent over wireless networks."

Cybersecurity

Back to school: Meet NIST's leader for national cybersecurity education

Federal Computer Week spoke today with Ernest McDuffie, who is leading the National Institute of Standards and Technology's coordination of the National Initiative for Cybersecurity Education.

Cybersecurity

Could WikiLeaks set back information sharing?

Former CIA director Michael Hayden says the recent posting of classified material about the war in Afghanistan exposes the risks of information sharing among intelligence agencies. But the government’s use of IT could be a bigger threat to personal privacy.

Cybersecurity

Cyber Command still struggling to define cyber war

The Cyber Command is charged with conducting and defending against cyber warfare, but we don’t really know what we’re doing yet in cyberspace, says former CIA director Gen. Michael Hayden.

Cybersecurity

Get a Pay Raise

If you haven't yet completed the 2010 <a href="http://www.surveymethods.com/EndUser.aspx?CDE9859FCC869F96CD">Salary Survey</a>, this weekend may be your last opportunity. Some very interesting data is already emerging, and it may be helpful to many of you when it comes to negotiating salaries and bonuses.

Cybersecurity

Pentagon mulls plan for NSA to monitor Defense contractors' network traffic

The Defense and Homeland Security departments are considering a plan that would allow the National Security Agency to monitor certain Defense contractors' networks for malicious activity, according a report posted by The Atlantic Web site.

Cybersecurity

SSH Brute Force Spotted

New reports are filtering in to SANS' Internet Storm Center about a new SSH brute force script, possibly named "dd_ssh."

Cybersecurity

Soundbytes: Defense official changes, NII good-bye and downsizing government

A weekly roundup of comments from Nextgov.com. All comments are presented in their original, unedited form.

Cybersecurity

A National Lab's 5 Tips for Better Security

Roger Johnston, a member of the vulnerability assessment team at the <a href="http://www.anl.gov/index.html">Argonne National Laboratory</a> near Chicago, delivered a keynote on Wednesday at the <a href=http://www.usenix.org/events/sec10/tech/>USENIX security conference</a> in Washington.

Cybersecurity

US-VISIT tests of limited value, GAO finds

The Homeland Security Department should incorporate more than the results of two recent pilot programs to decide whether and how to pursue a biometric-based air exit system for non-U.S. citizens.

Cybersecurity

Kill the Catch Phrase

Deloitte pushed out a press release Tuesday on recently being named the "best iconic and overall structure" winner for the 2010 National Cybersecurity Awareness Challenge. But is it newsworthy?

Cybersecurity

FCC charts 'Cybersecurity Roadmap' with public's help

The Federal Communications Commission wants public feedback as it develops its plan for cybersecurity.

Cybersecurity

Cyber's Big Business

For Maryland, cybersecurity pays. The state's governor, Martin O'Malley, wrote on Monday in a <a href=http://www.washingtonpost.com/wp-dyn/content/article/2010/08/06/AR2010080605935.html>commentary</a> appearing in the Washington Post's business publication, Capital Business, "Maryland is better positioned than other states to recover from the national recession stronger and sooner."

Cybersecurity

Infosec Lawyers at a Premium

For many unwelcome reasons, information technology security professionals need lawyers, but it's not always easy to find one that understands the nature of intricate infosec topics. In fact, many security practitioners report that the vast majority of lawyers they encounter are intimidated by computers. The question arises: Is there a kind of lawyer or law firm that focuses solely on infosec topics?

Cybersecurity

Hackfest revisited: It's getting scary out there

Cell phones, bank ATMs and power grids were just some of the devices and critical infrastructure shown to be vulnerable to hackers' prying and manipulation at recent security conferences.

Cybersecurity

DHS wants more teams that respond to cyber threats

The Homeland Security Department wants to expand its cadre of teams that help factories and power plants protect against cyber threats to their supervisory control and data acquisition systems.