Cyber Defense

Apple Publishes New Guidelines Regarding How Law Enforcement Can Request Data

CUPERTINO, Ca. - Apple has published a new set of guidelines regarding how law enforcement agencies and other government entities may request information from the company about user data. The new rules, which were posted to Apple's website late Wednesday, reflect Apple's move toward notifying its customers when it receives law enforcement requests for user

By |2014-05-08T00:00:00-04:00May 8th, 2014|Archive, Cyber Defense|

Former NSA Chief Defends Government Spying On US Citizens

WASHINGTON DC - It didn't take long for Gen. Keith Alexander, the recently retired director of the National Security Agency, to speak out about the government intelligence agency. The four-star general, who retired last month, touched on a wide range of subjects in an interview published Thursday by the Australian Financial Review, including the NSA's

By |2014-05-08T00:00:00-04:00May 8th, 2014|Archive, Cyber Defense|

aimWest Panel To Explore IT Security, Privacy May 21

GRAND RAPIDS - Technology is something that every business today depends upon in one way or another. Attend the May aimWest event as the group discusses the latest trends in IT Security and Privacy, what the greatest risks are, and how you can defend yourself, your family, and your business. The Panel includes: Stuart Berman,

By |2014-05-07T00:00:00-04:00May 7th, 2014|Archive, Cyber Defense|

DHS Releases Solicitation For Small Business Innovation Research Program

WASHINGTON DC - The Department of Homeland Security has issued its solicitation for the 14.2 Small Business Innovation Research Program addressing the needs of seven DHS operational units. DHS's Science and Technology Directorate and the Domestic Nuclear Detection Office participate in the SBIR Program as well. This solicitation covers the S&T Directorate's SBIR Program only.

By |2014-05-06T00:00:00-04:00May 6th, 2014|Archive, Cyber Defense|

Capture The Flag At MCRCon Cybersecurity Conference

ANN ARBOR- MCRCon Cybersecurity Conference, hosted by Merit Network, is challenging IT pros and computer enthusiasts to a Capture the Flag competition on May 20 at the Michigan Cyber Range. The competition will test the speed and skill of competitors within this virtual Internet environment. Participants will search for clues and collect flags to win

By |2014-05-05T00:00:00-04:00May 5th, 2014|Archive, Cyber Defense|

IT Security, Privacy Focus Of aimWest May 21

GRAND RAPIDS - Technology is something that every business today depends upon in one way or another. The Internet has opened up a new era of connectivity and communication for both our professional and personal lives. These great benefits & advancements, however, have also come with new risks & privacy concerns that are greater than

By |2014-04-30T00:00:00-04:00April 30th, 2014|Archive, Cyber Defense|

Former Michigan CIO Teri Takai Leaving Pentagon CIO Post

WASHINGTON DC - Defense Department CIO Teri Takai is leaving her post, effective Friday, FedScoop has confirmed. Takai was the Michigan CIO under former Gov. Jennifer Granholm. A source close to Takai confirmed her planned departure, but declined to provide additional details. Takai has served as the Pentagon?s CIO since 2010, and has managed the

By |2014-04-28T00:00:00-04:00April 28th, 2014|Archive, Cyber Defense|