Owners of critical infrastructure might be shamed into providing the necessary security to safeguard their information assets. That's one takeaway of a compromise Senate bill proposed by Democrat Sheldon Whitehouse and Republican Jon Kyl.
Howard Schmidt takes exception with aspects of our blog that addresses his position in the White House hierarchy and relationship with agencies' chief information security officers. Here's his response.
Federal authorities have charged a Dutch hacker for the role he played in an elaborate scheme that targeted POS systems and networks to steal credit card details that were later sold on websites for fraudulent purposes.
Georgia Tech Research Institute is beta testing a malware intelligence system that research scientist Chris Smoak contends will help corporate and government security officials share information about the attacks they confront.
Why did hackers target the federal Thrift Savings Plan? Details from the FBI and the TSP have been sketchy, and Sen. Susan Collins is demanding more information - including the reasons behind the delayed notification.
President Obama ordered increasingly sophisticated cyberattacks to cripple Iranian nuclear enrichment centrifuges as part of a major expansion of America's first persistent use of cyberweapons, according to a new report.