This testimony, delivered in 2008 at the conclusion of a security review of the Los Alamos National Laboratory, reports on the state of the laboratory's physical and cyber security, including shortcomings in the security of its unclassified computer networks.
This document outlines South Korea's strategy for developing an effective cyber response capability. Cooperative efforts are heavily emphasized.
This notice by the Chief of Naval Operations reorganizes commands between Fleet Cyber Command and the Navy Information Dominance Force.
This document outlines challenges to law enforcement that arise from rapidly evolving encryption techniques and risk outpacing the law enforcement community's decryption capabilities.
This presentation outlines an adaptable framework for cybersecurity that can be tailored to specific critical infrastructure 'profiles'.
This document observes that security is being outpaced by innovation related to the Internet of Things and establishes a framework of developing the relevant security within the developer, manufacturer, service provider, and consumer communities.
This report examines secure efforts in federally-administered critical infrastructure and recommends that DHS make efforts to coordinate access control between different sectors.
This document explains the FISA Amendments Act from the perspective of the US Intelligence Community.
This document reveals that first responder professional networks and personal information have been increasingly targeted in cyber attacks.
This document explains the function of the Justice Department, specifically the FBI, in federal response to cyber incidents.
This notice warns of vulnerabilities in several models of pacemakers using RF communications.