NIST offers practical guidance on intrusion detection and prevention systems to help counter the new breed of stealthy, targeted attacks.
DARPA seeks proposals for new software that can scour social media and other sites to predict cyberterrorism events.
Top state IT leaders have adopted a new strategic plan aimed at putting a stronger emphasis on CIO leadership.
It would be a shame if feds were scared away from information-rich conferences like Black Hat because of the excesses of some GSA managers.
At Black Hat, Apple's security chief gave a rare look into how the company hardens its iOS operating system.
The Massachusetts Health Insurance Connector Authority is using LexisNexis identity management software to verify the residency information of people participating in the exchange.
The NSA's chief says attacks on U.S. critical infrastructure increased 17-fold in two years, while Iran's nuclear program continues to be a target.
Phishing is the most common attack used against federal networks, so it's important to be aware of the latest techniques, even if they seem unlikely.
Former FBI official Shawn Henry said government understands the need to be more forthcoming with cyber intell, but creating the necessary legislative and policy framework is complex.
Office of Naval Research’s “network bridging system” moves data instantaneously between the combat system and the command and control network.
Smart meters have an optical port that, if attacked, can let someone change the way they operate, a researcher says at Black Hat.
This year's Black Hat Briefings will tackle OS security — or lack of it — in Windows and iOS. Mobile devices and industrial control systems get a lot of attention, too.
Security in the latest version of Microsoft’s operating system beats previous releases by “leaps and bounds,” according to researchers at the Black Hat Briefings.
Sen. Lieberman introduces cybersecurity bill that offers limited liability for sharing threat information and emphasizes continuous monitoring of government IT systems.
A compromise version of Cybersecurity Act of 2012 backs continuous monitoring of government IT security over regulatory compliance in the Federal Information Security Management Act.