Government - Page 56

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Cybersecurity Plan On The Lite Side

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Bush administration's long-awaited plan for protecting the nation's critical computer systems from cyberattacks is too weak because it does not set specific requirements for federal agencies or the private sector to follow, and politics is mostly to blame for the . . .

Cybersecurity Plan Avoids Call for New Rules

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A White House panel said Wednesday that the nation should deal with potential threats to computer security by educating users and by letting market forces -- not government mandates -- fix problems. The recommendations, released at Stanford University, range from . . .

Four Agencies Achieve Interoperable PKI

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After five years of work, the General Services Administration's Federal Bridge Certification Authority has made the public-key infrastructures of four agencies interoperable. For the first time in history, federal agencies will accept each other's digital certificates through the bridge. . .

Cybersecurity Plan Lacks Muscle

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After Sept. 11, 2001, cybersecurity czar Richard Clarke crisscrossed the country berating technology companies for failing to do enough to shore up the Net against potential terrorist attacks. In unveiling a highly anticipated White House cybersecurity proposal on Wednesday, however, . . .

Cybersecurity plan to offer tips, not rules

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Under intense lobbying by industry groups, a White House panel studying ways to protect America's high-tech backbone has dropped several security ideas and turned others into topics for discussion rather than government mandates, according to the latest version of the plan. . . .

Critics: Industry Lobbying Removes 'Meat' From Proposals

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Under intense lobbying by industry groups, a White House panel studying ways to protect America's high-tech backbone has dropped several security ideas and turned others into topics for discussion rather than government mandates, according to the latest version of the plan. . . .

White House Slows Cybersecurity Planning

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Bush administration will not unveil the final version of a national cybersecurity plan this Wednesday, saying it wants to gather more input from the technology industry. The White House had been expected to offer a detailed strategy for protecting . . .

Terror Czar: The War Is Digital

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The government's current snooping system -- known as Carnivore -- makes it too easy to "enable the reading of all e-mails with only a warrant," McCaffrey said. This indiscriminate access makes it difficult for local law enforcement to find useful evidence . . .

Administration Pares Cyber-Security Plan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As the White House moves to finalize a national plan to better secure cyberspace, high-tech firms and other companies are continuing a furious campaign to have some recommendations struck from the document. The administration no longer plans to recommend that Internet service providers such as America Online, MSN and EarthLink bundle firewall and other security technology with their software.. . .

White House Cybersecurity Chief Defines Cyberthreat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Richard Clarke, chairman of the president's Critical Infrastructure Protection Board, recently spoke with Computerworld reporter Dan Verton about the nature and potential of the threat to the nation's critical infrastructure and what he sees as his biggest challenges with respect to national cybersecurity. Can you briefly explain the cybersecurity threat for those who still may not be sure who or what the enemy is. . .

Why FBI Computer Force is not Fat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The carefully coiffed men wearing suspiciously shiny shoes are at every major computer security convention. They are there to remind hackers that law enforcement is always interested in their activities. They are also there to encourage security experts to become . . .

GSA reviews authentication needs of e-gov projects

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The General Services Administration has reviewed security needs for five of the 24 Quicksilver e-government projects and will finish reviews for the other 18 within the next 12 to 14 months. E-Authentication project leaders assessed the Business Compliance One-Stop, E-Grants, . . .

War College Calls A Digital Pearl Harbor Doable

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Naval War College and consultants from Gartner Inc. of Stamford, Conn., last month held war games to see how easy it would be for attackers to disrupt key segments of the U.S. economy. They concluded it was doable, given enough . . .

Bush's Cyber-Security Plan Targets E-Mail

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In an effort to bolster the nation's cyber-security, the Bush administration has plans to create a centralized facility for collecting and examining security-related e-mail and data and will push private network operators to expand their own data gathering, according to an . . .

Plans emerging for national security data sharing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

They may not be the Continental Congress, but hundreds of IT experts from the defense and intelligence communities gathered here yesterday to share ideas and plans on emergency responses to a terrorist attack on the nation. Only blocks from the . . .

Linux makes a run for government

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A technology policy think tank is campaigning to win Linux a greater role in government by offering to act as a central repository for a federally certified version of the open-source operating system. . .