Government - Page 57
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The results of the "Digital Pearl Harbor" conducted last month at the US Naval War College are now available. The goal of the simulation was to conduct an organized, well-funded electronic attack directed at various facets of national infrastructure: telecommunications, . . .
The Federal Aviation Administration, like many organizations trying to secure large, complex networks, was in a quandary. Information technology operators at the FAA were overwhelmed by the vast amount of data being generated by the many security devices strategically deployed to . . .
As was often the case, Bruce Schneier was thinking about a really terrible idea. We were driving around the suburban-industrial wasteland south of San Francisco, on our way to a corporate presentation, while Schneier looked for something to eat not purveyed . . .
James Bond technologies like face recognition, fingerprint sensors, hand geometry, and other biometric security systems may be impossible to accurately evaluate, unless researchers also measure the performance of the testers and the demographics of the subjects, a key researcher said Wednesday. . . .
The government was monitoring a series of electronic attacks launched early Tuesday against United States Internet providers, hours after European authorities passed warnings to the FBI predicting the attacks. The impact from the attacks appeared limited, and there were no . . .
When Adam Bresson showed how to make copies of copyright-protected videos in a speech at a hacker conference this weekend he realized he was risking arrest for violating U.S. copyright law that landed a Russian man behind bars after the same event last year.. . .
As part of a governmentwide effort to overcome the security gaps in commercial wireless devices, Defense Department officials plan to issue stricter rules for how defense personnel use them, the department's top technology manager said last week. "We're going to put . . .
Security researchers and hackers who find vulnerabilities need to realize that discretion is more important than valor, several federal security experts said at the Defcon hacking conference here this weekend. . .
The government is urging "white hat" hackers to search for security flaws in software, but also wants them to only pass information about those flaws on to software vendors and the government, not to the rest of the security community as . . .
A White House adviser is urging computer professionals and hackers to do more to help uncover software glitches.Computer security advisor Richard Clarke has told experts attending the Black Hat conference in Las Vegas they have an obligation to help. . .
To avoid relying on future disasters to spur action and to drive proactive security measures, the President's Critical Infrastructure Protection Board, created by President Bush, will release a federal strategy for cybersecurity in mid-September, he said. That strategy, and what recommendations . . .
The Defense Department, concerned that hackers or spies might eavesdrop on classified meetings or secretly track the locations of top U.S. officials, is imposing new limits on its workers' use of the latest generation of wireless devices inside military buildings. . .
Information about IT security threats volunteered by the private sector to the proposed Homeland Security Department would be exempt from the Freedom of Information Act under House and Senate versions of the HSD bill. . .
The National Association of State Chief Information Officers today announced it has signed an agreement with the primary federal infrastructure security analysis and warning center so that individual states can receive alerts on cyber and physical threats. . .
Copyright owners would be able to legally hack into peer-to-peer networks, according to a bill introduced in the House of Representatives on Thursday. As previously reported by CNET News.com, the measure would dramatically rewrite federal law to permit. . .
There was a fabulous explosion Wednesday during an otherwise typical cyberterror dog-and-pony show on the Hill when House Government Reform Subcommittee Ranking Member Jan Schakowsky (Democrat, Illinois) lost her composure during. . .
Internet security issues need to be addressed in boardrooms and executive suites, not just data centers and network storage closets. That's the message one industry organization is trying to convey by targeting the upper echelon of management with a guide on how to ward off potential threats.. . .
The National Association of State Chief Information Officers (NASCIO) today issued a report urging government leaders in all 50 states to set aside political differences and make cybersecurity and critical-infrastructure protection a top priority. . . .
If House Hollywood sock puppet Howard Berman (Democrat, California) gets his way, it will become legal to hack a network in efforts to impede the on-line illicit trade in copyrighted works. . .
Can IT projects and government requirements be aligned to benefit both security and business goals? Executives usually don't look to the government for help with business-technology goals. But some have found surprising synergies between the Bush administration's homeland-defense strategy and their . . .