Security Jam wants bread-and-butter proposals

Security Jam, powered by IBM, has brought thousands of participants together to discuss the challenges of cybersecurity; step two is getting concrete proposals.

IBM 'jam' technology goes global

The Security Jam uses an IBM platform to bring together thousands of participants eager to take on cybersecurity.

Will cyberattacks lead to bomb-and-bullets war?

Until now, the combination of cyber and war sparked notions of virtual armies slamming away at each other in cyberspace, a nasty confrontation online but relatively harmless for regular folks.

Don't forget who's behind a cyberattack

Federal agencies have long taken the leadership position in cybersecurity on one key point; recognizing that it’s not enough to know how networks were hacked, but also to know by whom.

Lockheed opens next phase of DARPA cybersecurity initiative

Lockheed Martin Corp. will continue to work with the Defense Advanced Research Projects Agency to help develop a governmentwide cybersecurity initiative under a $30.8 million contract.

Virtual border fence would lose under budget

The administration wants $43.59 billion for the Homeland Security Department in fiscal 2011 compared with the $42.60 billion that the department got for this year.

DARPA: Calling all cyber geneticists

A DARPA research program would combine technologies to apply genetics, anthropology, sociology and physiology to the identification of cyberattackers.

ManTech acquisition targets valuable Army customer

ManTech International Corp.'s purchase of Sensor Technologies Inc. brings with it a prime contractor position on the Army's Strategic Services Sourcing contract program.

Small defense project might change the world of networking

BBN Technologies will help the Air Force develop new approaches to better protect Defense Department service-oriented architectures against malicious attacks.

New cybersecurity coordinator says he has the president’s ear

In his first public talk since taking the job, Howard Schmidt seeks to allay concerns about his influence in the White House.

Cell phone codebook exposes security gaps

The release of a GSM codebook is a warning that cell phones are an easy and dangerous security gap without encryption.

6 ways to improve cell phone security

Establishing guidelines is the first step in improving cell phone security, but don't stop there.

In cybersecurity, our greatest enemy may be...

In many cases, the greatest cybersecurity threat comes from a deliberately designed weakness in software.

New evidence in Google attack points East

A security researcher for SecureWorks says he has found evidence to support Google's claim that last month's attacks on the company’s systems originated in China, while another security expert called the attacks the largest and most sophisticated in years aimed at businesses.

Microsoft to Congress: Time to seed cloud computing

Privacy, security, and international sovereignty issues need congressional attention, says Brad Smith, senior Microsoft executive.

CACI buys cybersecurity products maker SystemWare

CACI International Inc. has signed an agreement to acquire SystemWare Inc., a manufacturer of signals acquisition and analysis systems to detect cybersecurity and physical security vulnerabilities.

Governments weigh the pros and cons of private clouds

Cloud computing is a tough sell to governments because of privacy and security concerns. Private clouds could make the difference.

Microsoft will maintain its great firewall in China

Microsoft CEO Steve Ballmer says his company will continue to comply with China's censorship rules, despite Google's recent suggestions that it might exit that market due to Chinese government censorship practices.

Cyber crime takes a bite out of legitimate systems

Attacks on systems often go undetected and are growing in number and sophistication.

Army mulls realignment to fortify cyber command

Army officials are weighing realigning networking and communications units to build a fully operational cyber component by October 2010.