Government - Page 54

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

NSA and NIST complete profiles for security needs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Institute of Standards and Technology and the National Security Agency have completed profiles for recommended security features for five of the 10 technology areas the agencies have targeted for profile development. The Protection Profiles, when completed, will be included in the evaluation process for Common Criteria certification of IT security products. . . .

Presidential board releases cyber-security plan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The President's Critical Infrastructure Protection Board (PCIPB) has issued a draft plan for upgrading security protections for the nation's cyberspace infrastructure. The strategy emphasizes that protection of the nation's information technology infrastructure is not a job that government can do alone, . . .

Pentagon Computers Tougher For Hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Department of Defense's computer networks were probed by hackers 14,500 times last year, with just 70 getting in. Of those, only three caused any damage -- and they were the same viruses that hobbled the private computer networks, according to . . .

White House Investigating Attack on Internet

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Bush administration said on Wednesday it was investigating this week's coordinated attack on the Internet, but played down speculation it was carried out by terrorists. ``There is an investigation under way to determine who is responsible for the attacks,'' . . .

P2P hacking bill may be rewritten

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Alec French, an aide to bill author Rep. Howard Berman , D-Calif., defended his boss' ideas but acknowledged that some critics had made reasonable points about the controversial proposal. "He plans to significantly redraft the bill to accommodate reasonable concerns before reintroduction in the 108th (Congress)," French said during an afternoon event at the conservative Heritage Foundation. . . .

Army Locks Down Wireless LAN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Fort Sam Houston is a prime candidate for wireless networks. The San Antonio installation is home to the commanders of the Army's medical systems and supports various military training services, including battle simulation. Because other tactical groups often conduct tests at . . .

Cyber Bill Gets Boost

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Senate passed a bill Oct. 16 that will provide more than $900 million over five years for cybersecurity research and development. The full Senate passed the Cyber Security Research and Development Act (S. 2182), which authorizes funding for new . . .

Navy searching for hundreds of missing computers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At least 595 laptops and desktops belonging to the Navy's Pacific Command in Hawaii have been potentially lost or compromised, according to an internal report that detailed the service's inability to account for hundreds of computers, some of which contained classified . . .

Guidelines for Reporting Security Incidents

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

CIO magazine, in conjunction with the Secret Service and FBI, has put together a set of guidelines for businesses to follow when notifying law enforcement agencies and other authorities of security incidents. The report covers what kind of events should be . . .

Senate Approves Almost $1B for Cybersecurity Research

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. Senate Wednesday night unanimously passed legislation that would more than triple the federal funding commitment to cybersecurity research, to about $978 million over five years. The bill authorizes grants for basic research and industry partnership programs. . .

Clarke Solicits Cyber-Security Input at MIT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After releasing a draft of the National Strategy to Secure Cyberspace for comment in September, Clarke has embarked on a cross-country tour, soliciting feedback on the document and stumping for passage of the bill that would create the Department of Homeland . . .

Domestic Security Summit Will Link Govt., Industry

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In a sure sign of the changing times, executives from promising technology start-ups will rub elbows with venture capitalists and representatives from the federal government at an exclusive Florida resort next month to hatch ideas for one of the hottest areas . . .

Firms 'must do better' On IT Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The British government has urged companies to take IT security more seriously, amid concern that almost three-quarters of firms have no policy on information security. Speaking at an event in London on Tuesday, e-commerce minister Stephen Timms said it is . . .

Work On National ID Persists

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Although the loud public debate about a U.S. national ID card has quieted, interest in its usage continues in both private and public business sectors. While the debate persists about exactly when it will come to pass and what form factor it will take, quiet tests of new technologies continue. . .

Feds Spur Security Plan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The federal government is pushing ahead with its agenda to improve the security of public and private networks, working to garner support for key components and developing plans to refocus the National Information Assurance Partnership. Specifically, the NIAP is crafting two . . .