Gen. Keith Alexander, commander of U.S. Cyber Command and director of the National Security Agency testified yesterday for the Senate Armed Services Committee. Alexander blamed China for many of cybersecurity threats but maintained that the DHS and not the DoD should be the lead in protecting govern...
Posts Tagged: private networks
The state of U.S. computer security today hearkens back to the pre-Sept. 11 days when the CIA and the FBI were unauthorized to share intelligence, said federal officials and lawmakers promoting a new bill that would sanction the government and industry to exchange network threat information. The leg...
A Pentagon pilot program that uses classified National Security Agency data to protect the computer networks of defense contractors has had some success but also has failed to meet some expectations, according to a study commissioned by the Defense Department....
A Pentagon pilot program that uses classified National Security Agency data to protect the computer networks of defense contractors has had some success but also has failed to meet some expectations, according to a study commissioned by the Defense Department....
via Nextgov The Pentagon this fall expects to make permanent and expand a test program through which the Defense Department shared classified intelligence on cyber threats with select contractors to better secure commercial networks serving the military. The trial that ran from May 9 through Sept. 1...
In July, CTOvision.com created and distributed a survey on the new proposed Defense Federal Acquisition Regulation Supplement (DFARS) to safeguard unclassified Department of Defense information on contractor networks. After receiving responses from government, industry, and academia, we’ve sum...
via eWeek While cyber-attacks against U.S. computer networks are becoming more frequent and increasingly more sophisticated, the country is lagging in its efforts to beef up IT security, government officials testified in front of Congress. The Energy and Commerce Subcommittee on Oversight held heari...
via National Defense Magazine The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. In the rush to defend criti...