A NATO for cyberspace?

British lawmakers are trying to make a case that the current state of cybersecurity requires an international consensus on global regulations to govern it.

NIST guidelines: Broccoli and cheese

NIST's FISMA project leader explains how agencies can team up to hack away at the time and effort needed to qualify IT products and services for purchase.

How industry can help the new federal CTO

Chopra's position creates an opportunity for more collaboration between the public and private sectors.

The handicapper's guide to the FOSE conference

One person can't take in all of what the FOSE conference offers, so here's one suggested route to getting a good overview of what's happening in government information technology.

L-3 doubles down on intell, imagery work

L-3 Communications has won two Defense Department contracts for intelligence support work that have a combined value of more than $255 million.

DOD social media policy fails to answer security questions

Former Director of Defense Information Paul Strassmann questions how DOD's new directive, permitting NIPRNet access to the Internet, will work without more explicit security direction.

SBInet director shares frustrations and progress on delays, tests and Boeing

Mark Borkowski is in the unenviable position of overseeing SBInet, the border protection system that is as noteworthy for its ambitious scope as it is for technical glitches and schedule delays.

Will cyberattacks lead to bomb-and-bullets war?

Until now, the combination of cyber and war sparked notions of virtual armies slamming away at each other in cyberspace, a nasty confrontation online but relatively harmless for regular folks.

New cybersecurity coordinator says he has the president’s ear

In his first public talk since taking the job, Howard Schmidt seeks to allay concerns about his influence in the White House.

In cybersecurity, our greatest enemy may be...

In many cases, the greatest cybersecurity threat comes from a deliberately designed weakness in software.

NASA poised to spend billions to consolidate IT services

NASA has issued a request for proposals for what is expected to be the largest of five contracts, which together are estimated to be worth more than $4 billion to overhaul the agency's IT services.

Harris furnishes managed services to Air National Guard

Harris Corp. will provide information technology support to the Air National Guard network and regional operations and security centers under a new contract.

New evidence in Google attack points East

A security researcher for SecureWorks says he has found evidence to support Google's claim that last month's attacks on the company’s systems originated in China, while another security expert called the attacks the largest and most sophisticated in years aimed at businesses.

Microsoft to Congress: Time to seed cloud computing

Privacy, security, and international sovereignty issues need congressional attention, says Brad Smith, senior Microsoft executive.

IBM deal adds government expertise to analytics business

IBM will acquire National Interest Security Company LLC to bring more expertise in defense, health care, energy, logistics and security.

Governments weigh the pros and cons of private clouds

Cloud computing is a tough sell to governments because of privacy and security concerns. Private clouds could make the difference.

Cyber crime takes a bite out of legitimate systems

Attacks on systems often go undetected and are growing in number and sophistication.

Intelligence reform falls flat without technology

Calls for reform of the intelligence community have their merits, but let's not forget the vital role technology plays, writes associate Editor David Hubler.

SAIC adds CloudShield to intell and information systems unit

Science Applications International Corp. is acquiring CloudShield Technologies Inc., a cybersecurity and management solutions provider in Sunnyvale, Calif.

Obama gets good marks on first cybersecurity report card

The government needs to take an energetic lead on protecting the IT infrastructure, says a local government security guru.