The US government is to introduce a "cyber espionage review" process into future purchases of IT after the measures were passed in a new funding law signed this week by President Obama. It follows reports in the press since the beginning ...
Tags: Cyber Espionage Review, IT, policy
The US government plans to reinforce its cybersecurity programme by expanding web monitoring, using a process which currently scans traffic going in and out of defence contractors and expanding it to private firms. That means employees of ...
Tags: US, Computer Products, web monitoring
The former chief scientist at a Kentucky defense contractor has been sentenced to a year in prison for buying pirated software from Russian and Chinese hackers and using it to design components for military helicopters. Wronald Best, 55, ...
Tags: pirated software, software, computer code
The U.S. Department of Homeland Security (DHS) has moved to agile development and is shifting to cloud platforms in an effort to improve its IT operations. At a hearing before the House Committee on Homeland Security on Tuesday, a DHS IT ...
Tags: Cloud, software, Computer Products, DHS
Less than six week after the Department of Homeland Security (DHS) issued a civil rights impact assessment stating that the government needed no warrant or cause to search laptops and other electronic devices at U.S. borders, a federal ...
Tags: laptops, electronic devices, smartphones
Simon Whitburn, Vice President of International Sales, AccessData According to AccessData Group, the Middle East is fast becoming a prime target for cyber criminals, mostly because so many regional organisations are underequipped to ...
Tags: AccessData, Simon Whitburn, Vice President
Heart attacks and cardiac events are the leading cause of firefighter Line of Duty Deaths (LODDs), resulting in over half of LODDs in 2011. But new technologies, such as the Wearable Advanced Sensor Platform (WASP), show promise in reducing ...
Tags: WASP, Protective Clothing, Disabilities
A Fibertect® decontamination wipe having bleached cotton outer layers around a non-particulate activated carbon center — developed by researchers at Texas Tech University (TTU), Lubbock, Texas — has been demonstrated to ...
GammaTech Computer Corp., a major international manufacturer and supplier of innovative notebook and tablet computers, will showcase the latest computing solutions for homeland security personnel at the AFCEA Homeland Security Conference in ...
Governor Bob McDonnell today announced the formation of Virginia’s newest collaboration between industry and Virginia universities: the Commonwealth Center for Advanced Logistics Systems (CCALS). Modeled after the successful ...
In what is turning out to be a repeat of last year, privacy rights groups launched an assault against the Cyber Intelligence Sharing and Protection Act (CISPA), barely a day after the controversial legislation was reintroduced in Congress ...
Tags: privacy rights, CISPA, controversial legislation, US
President Barack Obama's cybersecurity executive order, signed on Tuesday, could significantly expand the list of companies categorized as part of U.S. critical infrastructure sector, security experts said Wednesday. The executive order ...
Tags: cybersecurity, infrastructure sector, US
Applications for domestic drone licenses are increasing steadily, even as privacy concerns related to the use of unmanned aerial vehicles (UAVs) over the U.S. continue to mount. Government documents obtained by the Electronic Frontier ...
Tags: domestic drone licenses, drone authorization, unmanned aerial vehicles
Countries that have signed on to international cybersecurity agreements tend to have fewer malware infections among their citizens, according to new research released by Microsoft and George Washington University. Countries that have ...
Tags: international cybersecurity agreements, malware infections
A secret review of American policies governing the use of cyberweapons has concluded that President Barack Obama has the broad power to order pre-emptive strikes on any country preparing to launch a major digital attack against the U.S. ...
Tags: cyberweapons, broad power, digital attack