Chinese hackers are reportedly continuing their assault on the U.S. social coding platform GitHub with a distributed denial-of-service attack that is routing traffic from China's most popular search engine, The Wall Street Journal reported March 29.
The federally led program that's trying to provide secure online identity interactions for individuals and organizations across the nation is soliciting applications to test privacy-enhancing technologies.
As policymakers seek to nurture greater Internet of Things development, they should address issues like competition, standards, spectrum, security and privacy, among others, in a collaborative manner across all market sectors, a new industry white paper says.
Although the possibility of a catastrophic cyberattack is remote, the unclassified information and communication technology networks that support government, military, commercial and social activities remain vulnerable despite efforts to protect them, the national intelligence director said.
Leaders with the House Permanent Select Committee on Intelligence March 24 unveiled legislation that would encourage private companies to voluntarily share information on cyber threats with each other and the federal government as long as it doesn't go through the National Security Agency or the Defense Department.
Between January and February, the number of veterans who had personal information affected by data breaches nearly tripled, according to a new report.
Defense language training could be integral to grooming much-needed cyber warriors, a new RAND Corp. report states.
The abilities of governments to protect citizens are dwindling as cyber threats increase and jurisdiction over such matters lacks clarity, according to the authors of a new book.
The Cybersecurity Information Sharing Act of 2015, or CISA, continues its march through Congress, passing the Senate Select Committee on Intelligence March 12 by a vote of 14 to 1.
The CIA, in collaboration with federal and private sector partners, has improved its capabiltiies and understanding of cyber threats, but so have their adversaries.