A Justice Department report concludes that the intrusion detection system known as Einstein 2 that monitors federal employees Internet traffic does not violate their rights.
The landscape of hackers is filled with stories from those whose job is to hunt them down. SANS forensics instructor, Rob Lee, also a senior forensics consultant at the IT security consultancy Mandiant shares three "villain" examples of the types of attacks being seen in the field by the company's forensic...
Intel Director Blair's remarks coincide with his office's release of the latest National Intelligence Strategy, which elevates enhancing cybersecurity as a primary mission of the government's 16 spy agencies.
An audit by the Inspector General of the Department of Homeland Security reveals that more worked is needed to strengthen DHS's disaster recovery plan for its Nebraska Avenue Complex headquarters in Washington.
Schools are back in session in the U.S., the weather is cooling, and the fall flu season is close at hand.
So, how should businesses and government agencies prepare for the expected widespread return of the H1N1 virus?
Regina Phelps, a noted expert in pandemic preparedness, updates us on H1N1,...
Jobs in information security -- including architects, analysts and administrators with hot skills and competencies -- are among the IT opportunities offering the most employment security in the current economy.
This is the news from Foote Partners, LLC, a Florida-based research consultancy that focuses on IT...
More than half of current cyber attacks against businesses and government agencies are focused on two common vulnerabilities, according to "The Top Cyber Security Risks," a new report based on data from actual attacks.
The Department of Homeland Security maintains an effective, enterprise-wide information security management program for its intelligence systems, according to an unclassified summary of an audit conducted by the DHS inspector general.
The government accuses an analyst with a top secret clearance at the Defense Department's National Geospatial-Intelligence Agency with compromising a computer system used by the Army and FBI as part of a terrorism investigation.
Trojans. Harvesters. Mules. They're the backbone of the underground fraud economy, which is "vibrant" and worth billions, according to one international researcher.
And don't be swayed into a false sense of security by the recent indictment of Albert Gonzalez, who is charged with masterminding the Heartland Payment...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.