Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
The document was born out of President Obama's executive order to enhance critical infrastructure protection.
A draft of the voluntary framework was released by NIST in support of President Obama's executive order on critical infrastructure security.
The announcement in February 2014 by the White House of a Framework for the development of cybersecurity standards follows the announcement one year earlier by the White House of a Presidential Executive Order describing the Government's overall policy toward the cybersecurity on our nation's critical infrastructure.
The national and economic security of a nation depends on the reliable functioning of critical infrastructure. The physical and electronic elements comprising critical infrastructure are increasingly and inextricably interwoven. Enemies of the state and others who would benefit from the disruption of critical infrastructure realize this and can turn to...
America's second-largest city, Los Angeles, has announced the creation of its first ever Cyber Intrusion Command Center, intended to combat threats aimed at city services.
Two controversial pieces of privacy legislation have been killed after Canada's prime minister prorogued parliament.
Microsoft continues to fight an order requesting it to turn over customer emails stored in a data center in Ireland.
Virginia Governor Terry McAuliffe named members of the Virginia Cyber Security Commission on Friday, which was formed to improve cyber security in the state.
The role of the CISO is rapidly garnering a strategic voice at many organizations.
The civil liberties groups contend in a brief filed in New York Supreme Court, that warrants and a gag order issued in the case were unconstitutional.
Applications are the soft underbelly of most organizations. And, because of the nature of applications - they may appear to be working fine -- the extent of their vulnerability is often unclear.
On Wednesday, NIST published the 41-page guidance after months of feedback from the community.
On Tuesday, Senator Dianne Feinstein, D-Calif., revealed that the draft bill was in the works and she planned to move forward with the legislation.
Organizations in the finance, telecommunications, defense, and transportation industries have been targeted by attackers that may be looking to steal valuable information.
Like no other year before it, 2013 illustrated for the entire globe just how essential cyber security is to business endurance, economic durability and personal rights to privacy.
In his keynote address at the RSA Conference in San Francisco, Art Coviello discussed the NSA allegations and also outlined four principles that would serve as a set of standards when it comes to cyber warfare.
Phyllis Schneck takes a level-headed approach to how the DHS should address potential attacks against critical infrastructure.
The power of information as a commodity only continues to deepen as it satisfies so many disparate needs and wants.
We don't need to make the same mistakes of the first generation of PCs and servers, says the SANS Institute's John Pescatore.
The need for cyber threat intelligence sharing is still vital, and with Congress sidelined, it's going to take leadership from the nation's corporate executives to make progress on this issue within the framework of our current laws.