- NIST pledges transparency in NSA dealings over crypto standards
- New framework helps companies quantify risk
- US spy program has financial, security impacts, says Snowden
- Which cloud personality are you? Three ways to approach online storage
- Google's Project Zero publishes three OS X zero-day vulnerabilities
U.S. Department of Defense - News, Features, and Slideshows
The 6-foot, 2-in. tall humanoid robot that many teams in the finals of the DARPA Robotics Challenge will be using in June has gotten a major makeover. And the teams using it in the finals got their first look just last week.
Google is adding its muscle to PriceWaterhouseCoopers' bid to build a new cloud-based healthcare system for the military that would support its more than 9.7 million beneficiaries.
Without a carbon tax or anything that penalizes fossil fuel consumption, the federal government has little ability to influence how much energy a data center uses. But it is trying.
The U.S. House of Representatives has voted to limit the National Security Agency's ability to search U.S. records, after a similar provision was stripped out of a bill intended to rein in the agency.
Two sets of emails obtained by Al Jazeera America under a Freedom of Information Act request suggest that Google's cooperation with the National Security Agency may have been less coerced than the company has let on.
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.