Government

Tapping global threat intelligence to secure enterprise networks

On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information sharing between government and the private sector

Former acting HHS cyber director convicted on child porn charges

Former acting HHS cyber director convicted on child porn charges

By

Timothy DeFoggi, who was nabbed by the FBI last year in its Operation Torpedo investigation was convicted by federal jury in Nebraska.

California Assembly passes first student online privacy bill

By

The bill would prevent companies from selling students' data and profiting from it.

NSA's ICREACH search engine shares billions of records, The Intercept reports

By

More than 1,000 analysts at 23 U.S. government agencies have had access to more than 850 billion records courtesy of NSA's ICREACH, a search engine similar to Google.

Calif. passes law requiring smartphone kill switch technology

By

Starting July 2015, all smartphones sold in the state must come with the anti-theft technology.

FTC asks court to shut down debt relief scam

By

Claiming funding from the federal government and an endorsement by President Obama, a debt relief program coerced private data from consumers.

Report: UK police push for required mobile phone PWs

By

The Metropolitan Police have reportedly lobbied for two years to enact the standard.

Medical transcription provider settles data security charges

By

GMR Transcription Services in California agreed to settle FTC charges related to its security practices.

AP denied security docs on HealthCare.gov, a risk to private information

AP denied security docs on HealthCare.gov, a risk to private information

By

The Associated Press was denied a request made under the Freedom of Information Act for documents that contain security information on HealthCare.gov.

NSA works to automatically detect attacks, return strikes from foreign adversaries

NSA works to automatically detect attacks, return strikes from foreign adversaries

By

The NSA program, called "MonsterMind," is reportedly being developed by the intelligence agency.

FCC creates task force to scrutinize illegal stingray use

FCC creates task force to scrutinize illegal stingray use

By

The task force will examine the use of the technology by foreign intelligence agencies and criminals targeting Americans.

Skimming con drains pension of retired officer in Philippines

By

The National Bureau of Investigation (NBI) warned that the incident showcases the growing incidence of ATM skimming fraud.

DEA paid $850K for Amtrak passenger info that was available for free

By

The DEA paid an unnamed Amtrak secretary more than $850,000 for passenger information that it could have attained for free.

White House charges elite tech team with improving websites

By

After a disastrous rollout of healthcare.gov, the White House has put together a team of private sector gurus to improve federal websites.

The industry's role in public safety

By

In this video, Joshua Corman, CTO at Sonatype, chats with SC Magazine's Danielle Walker on his involvement in some important upcoming initiatives.

Black Hat:"Saving cyberspace" requires next-level defense focus

Black Hat:"Saving cyberspace" requires next-level defense focus

By

Speaker Jason Healey warned that the internet can only endure so much abuse before it's irreversibly damaged.

Breach of USIS believed to be state-sponsored, DHS reportedly impacted

By

Two USIS clients, the Department of Homeland Security and the Office of Personnel Management, have suspended their contracts as a result of the incident.

Wikimedia Foundation lists removed links under 'right to be forgotten'

By

The nonprofit group which run Wikipedia was notified by Google of links removed from its search results.

NIST drafts updated guidance for agencies assessing security, privacy

NIST drafts updated guidance for agencies assessing security, privacy

By

The guidance gives federal agencies improved assessment procedures for securing their information systems and networks.

Leahy bill would end bulk data collection, introduce reforms

Leahy bill would end bulk data collection, introduce reforms

By

Sen. Patrick Leahy introduced an NSA reform bill that would update the USA Freedom Act.

House passes two cyber security bills

By

One bill aims to improve agencies' website security, while another works to thwart critical infrastructure attacks.

House of Lords subcommittee highlights 'right to be forgotten' flaws

By

In a recent report, a House of Lords subcommittee called the "right to be forgotten" law unenforceable.

Report: Hackers stole data from Israeli defense firms

By

A report by Brian Krebs detailed the intrusions, which occurred between Oct. 2011 and Aug. 2012.

Companies accused of peddling bogus AV ordered to pay $5.1M

Companies accused of peddling bogus AV ordered to pay $5.1M

By

A federal court in New York issued default judgments against 14 companies and individuals who allegedly operated the scams.

Senator Leahy prepares bill to tackle NSA snooping

By

The bill is set to be introduced on Tuesday.

Report: Japan eyes law requiring security incident reporting

By

Bloomberg says the Japanese government is eyeing cyber security legislation to make companies 'fess up to security incidents impacting users.

CyberMaryland conference returns, hosts job fair for military vets

By

The conference will be anchored by the Maryland Cyber Challenge and Competition, a security job fair, and more.

Cyber Command tests gov't collaboration in wake of attacks

By

The two-week exercise, "Cyber Guard 14-1," was completed this month.

Almost 40 percent of Canada's Justice Department duped by phishing

By

Almost one in four employees at Canada's Justice Department fell prey to internet phishing in an exercise last December.

Privacy groups, security experts and others implore Obama to veto CISA

By

Much to the chagrin of privacy advocates and other security experts, the Cybersecurity Information Sharing Act of 2014 passed the Senate Intelligence Committee last week.

Sign up to our newsletters

POLL