The NSA's chief says attacks on U.S. critical infrastructure increased 17-fold in two years, while Iran's nuclear program continues to be a target.
Phishing is the most common attack used against federal networks, so it's important to be aware of the latest techniques, even if they seem unlikely.
Former FBI official Shawn Henry said government understands the need to be more forthcoming with cyber intell, but creating the necessary legislative and policy framework is complex.
Office of Naval Research’s “network bridging system” moves data instantaneously between the combat system and the command and control network.
Smart meters have an optical port that, if attacked, can let someone change the way they operate, a researcher says at Black Hat.
This year's Black Hat Briefings will tackle OS security — or lack of it — in Windows and iOS. Mobile devices and industrial control systems get a lot of attention, too.
Security in the latest version of Microsoft’s operating system beats previous releases by “leaps and bounds,” according to researchers at the Black Hat Briefings.
Sen. Lieberman introduces cybersecurity bill that offers limited liability for sharing threat information and emphasizes continuous monitoring of government IT systems.
A compromise version of Cybersecurity Act of 2012 backs continuous monitoring of government IT security over regulatory compliance in the Federal Information Security Management Act.
The Environmental Protection signs contracts that will help meet its goal of having 80 percent of its computing in the cloud by 2015.
The government efforts to secure the nation’s electric grid from cyberattack are hampered by a cumbersome regulatory system and inadequate enforcement, a Senate panel is told.
NIST proposed new options for using iris recognition as an alternative to fingerprints in federal Personal Identity Verification.