A NATO for cyberspace?
British lawmakers are trying to make a case that the current state of cybersecurity requires an international consensus on global regulations to govern it.
NIST guidelines: Broccoli and cheese
NIST's FISMA project leader explains how agencies can team up to hack away at the time and effort needed to qualify IT products and services for purchase.
How industry can help the new federal CTO
Chopra's position creates an opportunity for more collaboration between the public and private sectors.
The handicapper's guide to the FOSE conference
One person can't take in all of what the FOSE conference offers, so here's one suggested route to getting a good overview of what's happening in government information technology.
L-3 doubles down on intell, imagery work
L-3 Communications has won two Defense Department contracts for intelligence support work that have a combined value of more than $255 million.
DOD social media policy fails to answer security questions
Former Director of Defense Information Paul Strassmann questions how DOD's new directive, permitting NIPRNet access to the Internet, will work without more explicit security direction.
SBInet director shares frustrations and progress on delays, tests and Boeing
Mark Borkowski is in the unenviable position of overseeing SBInet, the border protection system that is as noteworthy for its ambitious scope as it is for technical glitches and schedule delays.
Will cyberattacks lead to bomb-and-bullets war?
Until now, the combination of cyber and war sparked notions of virtual armies slamming away at each other in cyberspace, a nasty confrontation online but relatively harmless for regular folks.
New cybersecurity coordinator says he has the president’s ear
In his first public talk since taking the job, Howard Schmidt seeks to allay concerns about his influence in the White House.
In cybersecurity, our greatest enemy may be...
In many cases, the greatest cybersecurity threat comes from a deliberately designed weakness in software.
NASA poised to spend billions to consolidate IT services
NASA has issued a request for proposals for what is expected to be the largest of five contracts, which together are estimated to be worth more than $4 billion to overhaul the agency's IT services.
Harris furnishes managed services to Air National Guard
Harris Corp. will provide information technology support to the Air National Guard network and regional operations and security centers under a new contract.
New evidence in Google attack points East
A security researcher for SecureWorks says he has found evidence to support Google's claim that last month's attacks on the company’s systems originated in China, while another security expert called the attacks the largest and most sophisticated in years aimed at businesses.
Microsoft to Congress: Time to seed cloud computing
Privacy, security, and international sovereignty issues need congressional attention, says Brad Smith, senior Microsoft executive.
IBM deal adds government expertise to analytics business
IBM will acquire National Interest Security Company LLC to bring more expertise in defense, health care, energy, logistics and security.
Governments weigh the pros and cons of private clouds
Cloud computing is a tough sell to governments because of privacy and security concerns. Private clouds could make the difference.
Cyber crime takes a bite out of legitimate systems
Attacks on systems often go undetected and are growing in number and sophistication.
Intelligence reform falls flat without technology
Calls for reform of the intelligence community have their merits, but let's not forget the vital role technology plays, writes associate Editor David Hubler.
SAIC adds CloudShield to intell and information systems unit
Science Applications International Corp. is acquiring CloudShield Technologies Inc., a cybersecurity and management solutions provider in Sunnyvale, Calif.
Obama gets good marks on first cybersecurity report card
The government needs to take an energetic lead on protecting the IT infrastructure, says a local government security guru.
Almost There!
Help us tailor content specifically for you: