An optimistic scorecard predicts that agencies will meet 95 percent of their priority goals by the end of fiscal 2014, but the race to the finish looks more like a slog than a sprint.
Many cybersecurity practitioners say, "forget the attacker, focus on the risk," but there is a growing consensus that the best way to combat cyber espionage is with political and economic responses.
Attacks are targeting Asian journalists using a recent high-profile report on Chinese hacking from the security company Mandiant.
Malware writers develop find new tactics to avoid detection while waiting for a chance to infect systems.
CSIS fellow Jim Lewis says we need to bring a full range of diplomatic and intelligence resources to bear against Chinese incursions into U.S. systems, not just beef up cybersecurity.
FCC was upbraided by auditors for cutting corners in upgrading network security. Did the commission create unnecessary risk or just do what was necessary?
Identity theft could be costing the government billions of dollars a year in fraudulent tax refunds, and it is hard to say whether the shift to electronic tax filing is a boon or a bane.
The House of Representatives has ruffled feathers by banning a peer-to-peer music network, but P2P raises security concerns that merit caution.
It's easy to forget that the Internet relies on physical infrastructure that can break. Not every disruption is an attack.
After more than a decade, the Federal Information Security Management Act could use some updating, but Congress should take the time to look at what really has worked.