Government - Page 53
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A last-minute addition to a proposal for a Department of Homeland Security bill would punish malicious computer hackers with life in prison. The U.S. House of Representatives on Wednesday evening voted 299 to 121 to approve the bill, which would reshape large portions of the federal bureaucracy into a new department combining parts of 22 existing federal agencies. . .
An unemployed British computer administrator will fight U.S. efforts to extradite him to face criminal charges in what U.S. authorities are calling the largest ever successful hacking effort against American military networks, his lawyer said Wednesday. . .
Last week's congressional midterm election means that the Homeland Security Department will be assembled fast--and that's the best news the technology market has heard since Netscape went public.The power shift in Congress means that IT and outsourcing budgets that had been . . .
Through a new task order for security services, the Health and Human Services Department has kicked off an effort to consolidate many IT services across its bureaus. The department this month signed a five-year task order with Internet Security Systems . . .
Congress approved a massive spending program on Tuesday afternoon that will allocate nearly a billion dollars for computer security research. By a voice vote, the U.S. House of Representatives agreed to the Cyber Security Research and Development Act (CSRDA), which . . .
About 6 percent of the Interior Department's computer systems remain disconnected from the Internet, 11 months after a federal judge ordered a departmentwide shutdown citing security concerns, according to a Nov. 1 Interior report. . .
Federal authorities have cracked the case of an international hacker who broke into roughly 100 unclassified U.S. military networks over the past year, officials said Monday. Officials declined to identify the hacker, a British citizen, but said he could be indicted . . .
California law now demands that the public be informed when government or corporate databases are breached. It's about time. In April, 2002, hackers broke into the payroll database for the state of California. For more than a month, cybercriminals rooted around in the personal information of 265,000 Golden State employees, ranging from Governor Gray Davis to maintenance workers and clerks. . .
Calling for help from the private sector, Steve Cooper, special assistant to the President and CIO in the White Houses' Office of Homeland Security, called for a "network of networks" of federal, state, and local governments and certain private sector industries . . .
To protect the classified information stored on her desktop computer, Special Agent Nenette Day uses one of the most powerful tools on the planet -- an air gap. Day points to an IBM ThinkPad. . .
The Senate likely will act quickly to pass homeland security legislation already cleared by the House and send it to a conference committee for speedy consideration, legislative sources said. As Republicans gain control of the Senate, prospects for Democrats' objections to . . .
Experts have made an important change to the 13 computer servers that manage global Internet traffic, separating two of them to help better defend against the type of attack that occurred last month. . .
The Homeland Security Office is evaluating applications to let agencies analyze links and relationships among information sets without breaching privacy laws or sparking interagency turf. . .
The U.S. Navy took one of its websites offline Tuesday and added new security controls to a second site after Internet surfers discovered they could access confidential Navy databases. The exposed Navy files included material designed to support a machine . . .
While the Great Wall no longer deters would-be invaders from entering China, experts meeting in Washington on Monday said the Chinese government continues to maintain a nearly rock-solid cyberwall. At a panel discussion held by the Congressional-Executive Commission on China, . . .
As Americans go to the polls today, a record number of counties -- almost one fifth by some estimates -- will be tallying the votes on electronic voting machines. But some experts worry that despite rigorous testing, the machines may not be as secure as their makers promise. . . .
What would happen if open source software were banned in the Defense Department? A recent study conducted by Mitre Corp. for DOD posed that hypothetical question and found this answer: The department's cybersecurity capabilities would be crippled and other areas would be severely impacted.. . .
Government security officials have begun a new era of interagency cooperation that has led to unprecedented levels of information sharing. And while the high-level meetings have strengthened government security capabilities, they have also highlighted shortcomings in a key part of the data gathering and analysis processes. . . .
As the military services continue to fight the first war of the Information Age, the Defense Department is making information technology a top priority - but not without major challenges, according to Paul Wolfowitz, deputy Defense secretary. . .
Following last year's 11 September terrorist attacks Mueller made the fight against cybercrime and cyberterrorism the FBI's number three priority behind counter terrorism and counterintelligence. . .