A decade of data breach information has revealed an unprecedented level of insight into the trends and patterns of cybercrime, including industry-specific trends that for the first time can be mapped to 14 critical security controls.
There’s a new opportunity for Army personnel working in cybersecurity. A new occupational specialty, the 25D Cyber Network Defender, is open to staff sergeants, sergeants first class and master sergeants in the active component.
Just hours before the endless back-slapping and stroking of journalistic egos took place at The Washington Post in celebration of its Pulitzer Prize for its reporting on the National Security Agency’s secret electronic surveillance programs, the top U.S. intelligence official took to the stage at the University of Georgia and urged students there to consider a vastly different narrative.
In an effort to bring some order to the emergency room triage process to treat Heartbleed, FedScoop presents a collection of the best, common-sense advice for those worried about losing the lifeblood of their enterprise to a bleeding heart.
The Navy yesterday named Vice Adm. Jan E. Tighe commander of U.S. Fleet Cyber Command and U.S. 10th Fleet, making her the first woman in U.S. naval history to take command of a numbered fleet.
Just three months before it learned the National Security Agency had hacked into its networks, China’s largest telecommunications equipment maker, Huawei Technologies Co., met with senior U.S. government officials in an effort to demonstrate its commitment to security, FedScoop has learned.
Federal IT professionals say their agencies cyber-resilient, but in reality many grapple with threats and internal ignorance, according to a new study.
President Barack Obama today is scheduled to meet with the CEOs of several major Internet companies to discuss civil liberties and privacy, and the government’s commitment to reforming bulk surveillance practices. But the Threat Matrix’s Dan Verton thinks some of the CEOs attending today’s White House meeting may leave disappointed with the president’s timeline for change and the cost.
The government must continue to invest in cutting-edge cybersecurity capability that can defend the nation in what will be the “battlefield of the future,” former Secretary of Defense Leon Panetta said.
FedScoop asked four leading thinkers in national cybersecurity to share what they would do or change to improve the state of national cybersecurity — beyond the framework.
The number of job postings for cybersecurity positions grew twice as fast as the overall IT job market in 2013, according to a new study.
This week, Threat Matrix wants to know who is ultimately accountable for the nation’s critical infrastructure cybersecurity. Is it the federal government or the private companies that own and operate the majority of that infrastructure?
Senior officials from the White House and Department of Homeland Security Thursday defended the administration’s hands-off approach to improving critical infrastructure cybersecurity, arguing that mandatory regulations would stifle innovation, hurt the economy and raise difficult questions about privacy and civil liberties.
2001 was a turning point for the company that brought the world Windows and arguably, the most popular office suite of productivity applications in history. Microsoft Corp. was under attack from cyber-criminals and it was losing. In fact, internally there were questions about the company’s ability to survive.
Major technology and telecommunications providers are twice as concerned about cyber-risks from outsourcing vendors and are twice as likely to report those concerns in public financial documents than the vast majority of the Fortune 1000, according to new research.
The mobile device and app market may be in for some big changes when it comes to security. And those changes could very well come as a result of new requirements being pushed by the Pentagon. Dan Verton caught up with DOD CIO Teri Takai at this year’s MobileGov Summit.
Teri Takai may have something no other federal chief information officer or industry executive has: a budget and a strategy that just might deliver on the promise of a more secure mobile device market.
A 2013 internal security risk assessment of the Department of Veterans Affairs’ main electronic health record system that warned a data breach was “practically unavoidable” did not consider various security mitigation actions the department had already taken to address a very specific vulnerability, according to VA officials.
Margie Graves, deputy chief information officer at the Homeland Security Department, Peter Gouldmann, director of the State Department’s information risk programs, and Steve Viar, director of FEDSIM at the General Services Administration’s Federal Acquisition Service spoke at yesterday’s AFFIRM luncheon about the current status and future of continuous diagnostics mitigation.
A 2013 internal Department of Veterans Affairs security risk assessment of the department’s main electronic health record system warned a data breach was “practically unavoidable.”