Document lays out framework for interagency and international cooperation to establish norms for responsible behavior in cyberspace.
An administration proposal would give security authority over federal systems to DHS and establish a national breach notification requirement, but provides little authority over privately owned critical infrastructure.
The intelligence community has a few data-mining and data analysis systems in place that make life easier for analysts who must wade through vast amounts of data to identify threats.
An advisory says a flaw in Iconics' Genesis32 and BizViz could allow "remote arbitrary code execution with privileges of the current user."
Cybersecurity legislation being proposed by the Obama administration favors public/private cooperation over regulation and gives DHS oversight of FISMA.
Investigators from 10 agencies are digging for usable intelligence from the vast amount of material taken from the terrorist leader’s compound.
Electronic Frontier Foundation finds that the FBI uses computer spyware to track suspects.
The court that reviews the FBI’s requests for secret electronic surveillance of U.S. residents granted 100 percent of them in 2010, raising concerns that it’s merely rubber-stamping the requests.
A survey of C-level executives predicts that the federal IT security workforce will double in the next five years, but budget squeezes and a shortage of qualified workers might make that a tall order to fill.
Technology, policy and operational control can help, but can anything guarantee that someone won't go rogue?
Terrorist leader Osama bin Laden's low-tech approach kept him hidden for years. But being off the grid eventually helped expose him, and new technology assisted in finding him.
Defense Department officials are implementing new procedures to protect the secret-level classified network from the kind of breaches that lead to WikiLeaks exposing diplomatic cables last year.
Mozilla politely rejected the Homeland Security Department's order to remove a plug-in that lets Firefox users evade anti-piracy efforts.
One expert says good encryption could keep Osama bin Laden's data unreadable, but others say the Navy SEALs were prepared for extraction.
Since Osama bin Laden probably went offline in 2002, third-party cell phone calls may have hinted as to where he was hiding.