Sen. Barbara Mikulski (D-Md.) is pushing to establish a new cybersecurity center of excellence at the National Institute of Standards and Technology.
The Commerce Department wants advice on how to improve commercial cybersecurity while sustaining innovation in the information economy.
The National Oceanic and Atmospheric Administration is defining the architecture needed to effectively manage, store and disseminate data to the public and other agencies in the wake of the Deepwater Horizon-BP oil spill.
Agencies are required under FISMA to provide training for IT security personnel, and the need to husband limited resources puts a high priority on matching appropriate levels of training with personnel. NIST offers some suggestions on meeting the challenge.
Some $795 million will be spent for broadband development in rural and underserved areas in a second round of grants.
Computer modeling tracking wind and water motion predicts where the oil billowing from BP's ruptured well is likely to come ashore.
Presidential memorandum calls for NTIA and FCC to identify 500 MHz of radio spectrum to be licensed for broadband connectivity over the next 10 years, and for development of technologies to make better use of this limited resource.
Anyone with a Web browser and Internet connection can now track data related to the Deepwater Horizon/BP oil spill in real time.
National Security Agency official Tony Sager says that sharing security information is not enough; information must be better managed to ensure that the right information about threats and vulnerabilities gets into the hands of those who need it.
National Oceanic and Atmospheric Administration’s new Web features a mapping tool that integrates oil spill data from federal and state agencies.
The Commerce Department and global Internet authorities are installing a change to the root system of the Internet to improve security for domain names.
Three senior senators have introduced legislation to bolster the Homeland Security Department's role in protecting the country's networks and systems from cyber threats.