Open letter urges Congress and the president to ensure U.S. surveillance efforts are "restricted by law, proportionate to the risks, transparent and subject to independent oversight."
The Defense Department wants contractors to offer up ideas on combatting espionage, sabotage, treason and terrorism.
Hill sources say the House Veterans' Affairs Committee has received only a single response to its multitude of inquiries.
With final comments on the NIST plan due Dec. 13, industry and agency experts are contemplating what comes next.
The challenge is a chess-like competition that pits teams of researchers against each other in a contest to develop unmanned cybersecurity systems.
Alexander's planned retirement offers a chance to reorganize, but the changes required are anything but simple.
Better mapping can give more detailed information to IT managers tasked with protecting networks.
The company plans to strengthen encryption of customer data and take a more active role in challenging efforts to collect information on users.
A Republican critic claims gaps in the department's defenses "would be obvious to a 13-year-old with a laptop."
Report finds a new family of mobile phone malware allows electronic attackers to bypass the digital signature apps that are key to "identity ecosystems."
Measure would provide a statutory framework to some elements of President Barack Obama's executive order on cybersecurity.
In the public sector, 59 percent of respondents said funding was the biggest limiting factor in their organization’s tech project success.