An official with the Homeland Security Department's National Protection and Programs Directorate says the government doesn't need a new cybersecurity strategy.
Apps for Government is the first suite of cloud computing applications to receive Federal Information Security Management Act certification and accreditation from the U.S. government. Microsoft also working to obtain certification for Web-based e-mail.
The Obama administration is working on an updated national strategy for securing cyberspace and plans to update a presidential directive from the George W. Bush presidency.
Boeing continued its expansion into the cybersecurity realm this week with the acquisition of Narus Inc., a provider of real-time network traffic and analytics software.
The recent appearance of an article about NSA in the Wall Street Journal could indicate that the spy agency is jockeying for position with DHS, writes blogger Brian Robinson.
The leaders of several Senate committees want President Barack Obama to weigh in on details of proposed cybersecurity legislation as they push to reconcile various measures.
The initial public offerings of Booz Allen Hamilton Inc. and KEYW Corp. offer compelling case studies on why companies choose to go public and what company attributes contribute to IPO success.
Rob Carey takes on the new post as director of strategy and policy at Navy Fleet Cyber Command, working directly under Commander Vice Adm. Bernard McCullough.
Although its headquarters is more than 1,750 miles from the Washington, D.C., metro area, RightNow Technologies Inc., of Bozeman, Mont., is in the right place at the right time, company officials say, as it looks to ramp up the company's cloud computing offerings in the public sector.
Salient Federal Solutions Inc., a recently formed information technology and engineering solutions company, has taken its first step into the mergers and acquisitions market by acquiring SGIS.
White House Cyber Coordinator Howard Schmidt explains what's behind the Obama administration's push to improve how people and systems are identified in cyberspace.