The Defense Department unveiled a new cyber strategy today that affirms its commitment to more effective deterrence in the cyber domain and the integration of offensive cyber options into combatant command plans.
The agency has strengthened its contractual clauses and is also making sure all agency contracts have the appropriate clauses in them – that is "clauses that require segregation of data."
In a new draft publication, the National Institute of Standards and Technology explores techniques for de-identification and summarizes almost 20 years of research.
The Obama administration largely supports both bills although it had some reservations regarding their liability protections. But civil liberties and privacy groups say they strongly opposed one bill sponsored by the House Permanent Select Committee on Intelligence.
An insufficient cybersecurity workforce – propagated by inadequate recruitment and retention measures – is hampering proper defense, according to a new report.
Twenty percent of cyberespionage attacks last year targeted the public sector – only second to manufacturing, with 27 percent of cyber espionage incidents – finds Verizon in its eighth annual data breach report.
As the Federal Aviation Administration shifts to a more advanced and networked Internet-technology based air-traffic control system, it needs to develop a comprehensive threat model to better protect computer networks against cyber threats.
Hacking activities were in line with what the FBI predicted would happen. It said the groups can perform "low-level" distributed denial-of-service, or DDoS, attacks and website defacements, but the latter tactic is more likely.
Despite progress, weaknesses remain within the Federal Deposit Insurance Corporation's information security program, ranging from inadequate policies and procedures to user access.
Dell's annual threat report focused on the most common attacks last year. The report uses data from its Global Response Intelligence Defense network and network traffic data from Dell SonicWALL.