Cybersecurity

DOD details strict flash drive rules

A DOD policy that bans using flash drives was relaxed recently because of adjustments made to Defense Department computer systems. But that doesn't mean there are no more limitations on their use.

Cybersecurity

Determining the motives for cyberattacks can be tricky

Sometimes allowing an attack to play out generates useful leads, security specialist says.

Cybersecurity

Navy looks to advance cyber defense

The Navy wants algorithms that can be used for malware detection and to distinguish between legitimate and malicious traffic.

Cybersecurity

Obama's Tech Team

The administration is full of executives with high technology IQs.

Cybersecurity

Users weigh online security vs. convenience

Respondents to a recent survey share their attitudes about online security risks and what service providers should do to protect users.

Cybersecurity

Massive botnet may have snared some agency systems

Computer security firm NetWitness discovered a botnet that, according to the firm, has compromised 75,000 systems at 2,500 organizations, including 10 federal agencies.

Cybersecurity

Cyber exercise aims to teach the good guys to think like the bad guys

The National Defense University's Cybersecurity Challenge wants to educate professionals on how hackers think to better understand how to spot and stop penetration attacks.

Cybersecurity

DHS falls behind in issuing HSPD-12 ID cards, IG reports

Poor management and not enough funding have caused the Homeland Security Department to fall behind in its distribution of HSPD-12 identification cards to employees and contractors, according to a new report.

Cybersecurity

SBInet's caretaker shares frustrations about delays, snafus

Mark Borkowski is in the unenviable position of overseeing SBInet, the border protection system that is as noteworthy for its ambitious scope as it is for technical glitches and schedule delays.

Cybersecurity

Why information sharing is not always enough

The job isn't done when information is shared but rather when it is thoroughly analyzed by people not only collecting the dots but also connecting them, writes Zoe Baird of the Markle Foundation.

Cybersecurity

Cyberattack simulation highlights vulnerabilities

A simulation exercise today showed the legal and technical problems a cyberattack could cause.

Cybersecurity

Software developers are to blame for most cyberattacks, say security experts

Researchers release a new list of dangerous programming errors.

Cybersecurity

DHS gets new intell chief

Caryn Wagner started today as head of the DHS office that uses information technology to share homeland security-related data with state and local authorities.

Cybersecurity

FEMA seeks social media contractor

Federal Emergency Management Agency issues a contract request for a media services company that can deliver information from disaster areas via social media and local media news outlets.

Cybersecurity

Congress urged to move one cybersecurity bill

Trying to consolidate cybersecurity bills would pose a major challenge for congressional leaders.

Cybersecurity

Former officials plan guest appearances in cyberattack simulation

A bipartisan group of former senior government officials will participate in a simulation to show how the government would craft a response to a major cyber incident.

Cybersecurity

DHS debuts open government suggestion box

The Homeland Security Department has debuted an online tool for public comment on how it can be more transparent to meet open government requirements.

Cybersecurity

Can insurers protect the U.S. from cyberattack?

Incentives for online insurance could help companies bounce back from hacks

Cybersecurity

Bringing cybersecurity to the watercooler

Federal Computer Week

Cybersecurity

Bringing cybersecurity to the watercooler

Melissa Hathaway, who led the Obama administration cyberspace policy review last year, urges a national dialogue in understandable language on the cyber threat.