Government - Page 57

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

"Digital Pearl Harbor" Results

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The results of the "Digital Pearl Harbor" conducted last month at the US Naval War College are now available. The goal of the simulation was to conduct an organized, well-funded electronic attack directed at various facets of national infrastructure: telecommunications, . . .

New tools give agencies a leg up on security data management

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Federal Aviation Administration, like many organizations trying to secure large, complex networks, was in a quandary. Information technology operators at the FAA were overwhelmed by the vast amount of data being generated by the many security devices strategically deployed to . . .

Homeland Insecurity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As was often the case, Bruce Schneier was thinking about a really terrible idea. We were driving around the suburban-industrial wasteland south of San Francisco, on our way to a corporate presentation, while Schneier looked for something to eat not purveyed . . .

Researcher: Biometrics Unproven, Hard To Test

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

James Bond technologies like face recognition, fingerprint sensors, hand geometry, and other biometric security systems may be impossible to accurately evaluate, unless researchers also measure the performance of the testers and the demographics of the subjects, a key researcher said Wednesday. . . .

Attack prompts U.S. Internet watch

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The government was monitoring a series of electronic attacks launched early Tuesday against United States Internet providers, hours after European authorities passed warnings to the FBI predicting the attacks. The impact from the attacks appeared limited, and there were no . . .

Copyright law has hackers on the defensive

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When Adam Bresson showed how to make copies of copyright-protected videos in a speech at a hacker conference this weekend he realized he was risking arrest for violating U.S. copyright law that landed a Russian man behind bars after the same event last year.. . .

DOD focused on wireless security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As part of a governmentwide effort to overcome the security gaps in commercial wireless devices, Defense Department officials plan to issue stricter rules for how defense personnel use them, the department's top technology manager said last week. "We're going to put . . .

Fed Plea: Stop Security Leaks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security researchers and hackers who find vulnerabilities need to realize that discretion is more important than valor, several federal security experts said at the Defcon hacking conference here this weekend. . .

Bush adviser promotes 'responsible hacking'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A White House adviser is urging computer professionals and hackers to do more to help uncover software glitches.Computer security advisor Richard Clarke has told experts attending the Black Hat conference in Las Vegas they have an obligation to help. . .

Cybersecurity Czar Urges Better Standards

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

To avoid relying on future disasters to spur action and to drive proactive security measures, the President's Critical Infrastructure Protection Board, created by President Bush, will release a federal strategy for cybersecurity in mid-September, he said. That strategy, and what recommendations . . .

Defense Department to Impose Limits on Wireless Devices

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Defense Department, concerned that hackers or spies might eavesdrop on classified meetings or secretly track the locations of top U.S. officials, is imposing new limits on its workers' use of the latest generation of wireless devices inside military buildings. . .

Deal struck for security alerts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Association of State Chief Information Officers today announced it has signed an agreement with the primary federal infrastructure security analysis and warning center so that individual states can receive alerts on cyber and physical threats. . .

Hollywood hacking bill hits House

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Copyright owners would be able to legally hack into peer-to-peer networks, according to a bill introduced in the House of Representatives on Thursday. As previously reported by CNET News.com, the measure would dramatically rewrite federal law to permit. . .

Congress blasts Feds on cyber-terror FOIA games

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There was a fabulous explosion Wednesday during an otherwise typical cyberterror dog-and-pony show on the Hill when House Government Reform Subcommittee Ranking Member Jan Schakowsky (Democrat, Illinois) lost her composure during. . .

Executives Advised to Take Role in Internet Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Internet security issues need to be addressed in boardrooms and executive suites, not just data centers and network storage closets. That's the message one industry organization is trying to convey by targeting the upper echelon of management with a guide on how to ward off potential threats.. . .

Report urges states to organize against cyberterror

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Association of State Chief Information Officers (NASCIO) today issued a report urging government leaders in all 50 states to set aside political differences and make cybersecurity and critical-infrastructure protection a top priority. . . .

Congress to turn hacks into hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If House Hollywood sock puppet Howard Berman (Democrat, California) gets his way, it will become legal to hack a network in efforts to impede the on-line illicit trade in copyrighted works. . .

Security Synergy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Can IT projects and government requirements be aligned to benefit both security and business goals? Executives usually don't look to the government for help with business-technology goals. But some have found surprising synergies between the Bush administration's homeland-defense strategy and their . . .