Government - Page 54
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The National Institute of Standards and Technology and the National Security Agency have completed profiles for recommended security features for five of the 10 technology areas the agencies have targeted for profile development. The Protection Profiles, when completed, will be included in the evaluation process for Common Criteria certification of IT security products. . . .
The President's Critical Infrastructure Protection Board (PCIPB) has issued a draft plan for upgrading security protections for the nation's cyberspace infrastructure. The strategy emphasizes that protection of the nation's information technology infrastructure is not a job that government can do alone, . . .
The Department of Defense's computer networks were probed by hackers 14,500 times last year, with just 70 getting in. Of those, only three caused any damage -- and they were the same viruses that hobbled the private computer networks, according to . . .
The Bush administration said on Wednesday it was investigating this week's coordinated attack on the Internet, but played down speculation it was carried out by terrorists. ``There is an investigation under way to determine who is responsible for the attacks,'' . . .
Alec French, an aide to bill author Rep. Howard Berman , D-Calif., defended his boss' ideas but acknowledged that some critics had made reasonable points about the controversial proposal. "He plans to significantly redraft the bill to accommodate reasonable concerns before reintroduction in the 108th (Congress)," French said during an afternoon event at the conservative Heritage Foundation. . . .
Fort Sam Houston is a prime candidate for wireless networks. The San Antonio installation is home to the commanders of the Army's medical systems and supports various military training services, including battle simulation. Because other tactical groups often conduct tests at . . .
The Senate passed a bill Oct. 16 that will provide more than $900 million over five years for cybersecurity research and development. The full Senate passed the Cyber Security Research and Development Act (S. 2182), which authorizes funding for new . . .
At least 595 laptops and desktops belonging to the Navy's Pacific Command in Hawaii have been potentially lost or compromised, according to an internal report that detailed the service's inability to account for hundreds of computers, some of which contained classified . . .
CIO magazine, in conjunction with the Secret Service and FBI, has put together a set of guidelines for businesses to follow when notifying law enforcement agencies and other authorities of security incidents. The report covers what kind of events should be . . .
The U.S. Senate Wednesday night unanimously passed legislation that would more than triple the federal funding commitment to cybersecurity research, to about $978 million over five years. The bill authorizes grants for basic research and industry partnership programs. . .
President Bush's point man on computer security says that the nation has a long way to go in securing its data networks but that new federal regulations would be a step in the wrong direction. . .
The Bush administration said Thursday that it will upgrade computer systems used by passenger screeners in more than 100 U.S. airports in an effort to improve security. . .
The Government's leading IT security advisors are to recommend that Whitehall departments adopt a US cryptography standard that many commercially available security products fail to meet. . .
After releasing a draft of the National Strategy to Secure Cyberspace for comment in September, Clarke has embarked on a cross-country tour, soliciting feedback on the document and stumping for passage of the bill that would create the Department of Homeland . . .
In a sure sign of the changing times, executives from promising technology start-ups will rub elbows with venture capitalists and representatives from the federal government at an exclusive Florida resort next month to hatch ideas for one of the hottest areas . . .
The British government has urged companies to take IT security more seriously, amid concern that almost three-quarters of firms have no policy on information security. Speaking at an event in London on Tuesday, e-commerce minister Stephen Timms said it is . . .
Although the loud public debate about a U.S. national ID card has quieted, interest in its usage continues in both private and public business sectors. While the debate persists about exactly when it will come to pass and what form factor it will take, quiet tests of new technologies continue. . .
The FBI is creating a $3 million computer forensics lab in Silicon Valley, using the latest imaging software and high-end computers to sleuth for cyber-clues of child pornography, corruption, murder and more. . .
The federal government is pushing ahead with its agenda to improve the security of public and private networks, working to garner support for key components and developing plans to refocus the National Information Assurance Partnership. Specifically, the NIAP is crafting two . . .
The National Institute of Standards and Technology's Computer Security Division has released three new draft guides for agencies on buying security technologies and services. . .