A Homeland Security Department official touted agency use of a machine-to-machine format for sharing cyber threat information during a March 7 hearing. It's rolling out a standardized way of representing cyber threat information in a structured way – in a manner that computers can understand – called the Structured Threat Information Expression.
What's worked for laptops and desktops won't work for mobile devices when it comes to verifying users' identity, says the National Institute of Standards and Technology. Enter what NIST calls a "derived credential," a way of taking the identity verification and encryption key infrastructure built up since 2004 for the identity smartcards and applying it to mobile devices.
Details so far on a proposed "federal cyber campus" contained within the White House budget proposal are scarce, beyond a few offhand references.
The military says it needs $5.1 billion in appropriations this coming fiscal year to fully support cyberspace operations, of the offensive and defensive variety.
The proposed Homeland Security Department cybersecurity budget for the coming federal fiscal year amounts to $1.25 billion, show budget documents released today. DHS over the course of the Obama administration has assumed an increasingly central role in securing federal networks and in urging private sector companies considered to be " critical infrastructure " into better cybersecurity practices.
A new electric grid industry group with support from Congress could help protect the grid against cyber attacks, says a report published Friday by the Bipartisan Policy Center.
Cyber vulnerabilities in the commercial energy sector have the potential to directly affect military operations even aside from installations' almost near-total reliance on the private sector for electricity, says a security researcher.
Massive online theft of consumer information has Attorney General Eric Holder urging Congress to legislate a national notification law. Just days after Target acknowledged the breach, Nieman Marcus also reported a suspected cyberattack found access to stored customer credit card data.
It describes the concept of cyber electromagnetic activities as the overlap between electronic warfare – such as jamming – spectrum management and cyber operations. The term first appeared in official Army strategy documents in 2011, when it merited a mention in another Army field manual (.pdf) governing unified operations on land.
A Homeland Security Department official said the department sees small and medium businesses as a key community for adoption of the cybersecurity framework released earlier this month. DHS released a request for information seeking feedback on the cybersecurity industry's capability to provide "broadly scalable cyber security solutions at an affordable cost" to small and medium businesses.