A re-introduction of the SECURE IT Act seeks to answer concerns from privacy advocates, while enlisting information sharing provisions deplete of U.S. government oversight.
The Obama administration on Wednesday revealed public-private partnership initiatives to thwart botnets.
Friday is the deadline for public comments regarding a government proposal to create a model by which internet service providers voluntarily alert consumers if their computers are part of a botnet.
Is it an ISP's responsibility to combat botnets, asks SC Magazine Executive Editor Dan Kaplan.
The event was launched on Friday with a gathering in Ypsilanti, Mich., featuring Secretary of Homeland Security Janet Napolitano and White House Cybersecurity Coordinator Howard Schmidt.
Despite the fact that reports often stress the need for robust government and industry partnerships, they've been slow to take shape. What has held back this seemingly symbiotic relationship?
The Georgia Tech Research Institute (GTRI) is currently heading a new five-year, $10 million U.S. Department of Homeland Security project to investigate open cybersecurity methods and how they can benefit government. The program, called Homeland Open Security Technology (HOST), is aimed at identifying open-source approaches that can support federal security objectives while saving agencies money. As part of the program, GTRI researchers are reaching out to members of government, industry and academia to learn how such solutions have been successfully implemented and where challenges remain. They plan to launch a public information portal this summer.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- Audit shows University of Maryland security flaws remain
- Securing the enterprise with the five W's of access
- Exploits, mobile and cloud storage threats will plague users in 2015
- 2015 trends to watch: Data destruction, endpoint intelligence and user behavior analytics
- Former employees sue Sony, theaters drop 'The Interview'
- Phishing email contains Word doc, enabling macros leads to malware infection