Employing efficient Internet technologies while safeguarding federal information systems and data is among the biggest information IT challenges the government faces.
Georgia Tech professor sees computers with wireless connections as likely furnishing unprecedented opportunities for criminals, hackers, terrorists, spies and other unsavory actors.
The time is ripe to create a fourth branch of the military a cyber-warfare branch.
So conclude two Army officers. The existing cultures of the Army, Navy and Air Force are fundamentally incompatible to adequately defend against cyber attacks, argue Lt. Col. Gregory Conti and Col. John "Buck" Surdu, in an article...
For the second time in four months, the Commonwealth of Massachusetts has pushed back the implementation of its new data protection law - one of the toughest in the nation.
Yet even with the new deadline of January 2010, many of the businesses impacted by these stringent data protection requirements won't be...
As Russian forces invaded the former Soviet bloc ally Georgia last summer, hackers in seemingly coordinated effort with their government assaulted Georgian Internet sites and services. The virtual warfare demonstrated that attacking another country's Internet sites could have devastating military and economic...
The number of identity fraud victims has increased 22 percent in the U.S., costing 9.9 million victims a total of $48 billion in 2008.
This is the news from the fifth annual Identity Fraud Survey Report from Javelin Strategy & Research. In an exclusive interview, James Van Dyke, Javelin founder and President,...
Reported data breaches increased by nearly half in 2008, and 12 percent of the total hacks were at financial institutions - up from 7 percent in 2007.
This is the news from the Identity Theft Resource Center's (ITRC) 2008 breach report, which shows that 2008's 656 reported breaches were up 47 percent over 2007's...
Sahba Kazerooni is a senior security consultant with Security Compass, a security consulting and training firm specializing in application security based in New Jersey. He is also an internationally-renowned speaker on security topics, and has provided presentations at security conferences around the world, including...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.